100% Undetectable Malware (?)
I know I’m checking in late on this story, but for some reason, it just escaped my radar a month or so ago when it appeared…I think that within the context of some of the virtualization discussions in...
View ArticleICMP = Internet Compromise Malware Protocol…the end is near!
Bear with me here as I admire the sheer elegance and simplicity of what this latest piece of malware uses as its covert back channel: ICMP. I know…nothing fancy, but that’s why I think its simplicity...
View ArticleVirtualization is Risky Business?
Over the last couple of months, the topic of virtualization and security (or lack thereof) continues to surface as one of the more intriguing topics of relevance in both the enterprise and service...
View ArticleBlue Lane VirtualShield for VMWare – Here we go…
Greg Ness from Blue Lane and I have known each other for a while now, and ever since I purchased Blue Lane’s first release of products a few years ago (when I was on the "other" side as a *gasp*...
View ArticleMy IPS (and FW, WAF, XML, DBF, URL, AV, AS) *IS* Bigger Than Yours Is…
Interop has has been great thus far. One of the most visible themes of this year’s show is (not suprisingly) the hyped emergence of 10Gb/s Ethernet. 10G isn’t new, but the market is now ripe with...
View ArticleFat Albert Marketing and the Monetizing of Vulnerability Research
Over the last couple of years, we’ve seen the full spectrum of disclosure and "research" portals arrive on scene; examples stem from the Malware Distribution Project to 3Com/TippingPoint’s Zero Day...
View ArticleThe Russian Business Network, ShadowCrew, HangUp Team, 76service, “Malware as...
Scott Berinato posted the first of three installments of an expose highlighting the economics of the malware industry in CSO magazine. It’s a fascinating read with a blow-by-blow of how Don Jackson...
View ArticleGoogle Security: Frightening Statistics On Drive-By Malware Downloads…
Read a scary report from Google’s security team today titled "All your iFrame Are Point to Us" regarding the evolving trends in search-delivered drive-by malware downloads. Check out the full post...
View ArticleA Worm By Any Other Name Is…An Information Epidemic?
Martin McKeay took exception to some interesting Microsoft research that suggested that the similar methodologies and tactics used by malicious software such as worms/viri, could also be used as an...
View ArticleWhy Steeling Your Security Is Less Stainless and More Irony…
(I originally pre-pended to this post a lengthy update based on my findings and incident response, but per a suggestion from @jeremiahg, I’ve created a separate post here for clarity) Earlier today I...
View Article
More Pages to Explore .....