The Trickle Down of Supply Chain Attacks

The Trickle Down of Supply Chain Attacks Rod Soto/Kevin Stear   Overview Supply chain attacks are malicious campaigns designed to damage an organization by targeting less-secure elements of…


Beyond SIEM, Beyond Orchestration

JASK AND DEMISTO FOR AUTOMATED SECURITY OPERATIONS AND INCIDENT RESPONSE Key Benefits: Welcome to the future of cybersecurity: use two integrated AI-driven Cloud-based platforms to reduce…


DoublePulsar exploit targeting Windows Embedded devices

Recent reports indicate a new wave of footprinting and implantation by a modified version of  DoublePulsar, an alleged NSA tool leaked by the Russian affiliated Shadow Brokers. This research…


DDoS Will Never Die

Distributed denial of service (DDoS) attacks present a force and power to be reckoned with. The problems they present have only gotten worse, and the situation certainly will not improve any time…


How to Keep Your Security Analysts

The Shortage… All vendors and companies talk about the security staff shortage, because it’s REAL. Though there is a large influx of tier-1 analysts who recently graduated, there are far more…


NoSQL-based stacks exposed to the Internet actively exploited

NoSQL technology has become more popular in recent years thanks to the development of new open-source NoSQL databases that are relatively easy to install, use and integrate with web frameworks. An…


Browser extensions: Hidden behind good, can be very bad

Visitinga website is a standard task for any user that uses the internet. The primary tool for viewing or visiting a website is called a web browser. A web browser allows web pages to render and…


Beyond SIEM: Evolving Correlation

Most SIEMs have a correlation engine where logic/rules are written against flows and logs to bring them to an analysts’ attention.  LogRhythm has their AI Engine Rules, ArcSight has correlation…


Dynamic Asset Discovery

By Pooja Ahuja with Xiaodan Li, Data Scientists at JASK Labs The Problem A large number of data breaches occur as a result of weak or inefficient perimeter protection. With the ever-increasing…


From Russia with Love?

From Russia with Love? Alarm bells went off last week as the United States Department of Justice (DOJ) reported that a large number of small office home office (SOHO) routers and storage devices…