Link Arms Against the Attackers: Observations from the 2016 Cisco ASR

By Martin Nystrom Remember 2007, when the underground economy began to flourish, using simple protocols and static subnet ranges to control their infrastructure? That was the same year Cisco published the first Annual Security Report (ASR) . Nine years later, the drumbeat of cyberthreats grow louder, but the actors and threats are familiar, just as […]

McAfee Mail Security – End of Sales

McAfee Mail Security – End of Sales Intel Security stellt den Verkauf der Gateway-Security Produkte von McAfee ein. Dies zeichnete sich bereits ab, da die Lösung im Januar 2014 (VBSpam) letztmalig extern getestet wurde. Mit unserem Technologie-Partner Fortinet bieten wir einen einfachen Weg, Ihren Mailverkehr auch weiterhin aktuell zu schützen. FortiMail bietet „Top Rated Protection“ – […]

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

By Blake Anderson Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a […]

Hiding in Plain Sight: Malware’s Use of TLS and Encryption

By Blake Anderson Introduction TLS (Transport Layer Security) is a cryptographic protocol that provides privacy for applications. TLS is usually implemented on top of common protocols such as HTTP for web browsing or SMTP for email. HTTPS is the usage of TLS over HTTP, which is the most popular way of securing communication between a […]

Overcoming the DNS “Blind Spot”

By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often […]

Overcoming the DNS “Blind Spot”

By John Stuppi [ed. note – this post was authored jointly by John Stuppi and Dan Hubbard ] The Domain Name Service (DNS) provides the IP addresses of intended domain names in response to queries from requesting end hosts. Because many threat actors today are leveraging DNS to compromise end hosts monitoring DNS is often […]

Why Aging Infrastructure Is a Growing Problem

By Anthony Grieco Defending a network against threats of growing complexity requires a mix of technology and policies that are as sophisticated as the campaigns created by attackers. A necessary component to an efffective defense includes tackling the low-hanging fruit—that is, basic tasks such as patching vulnerabilities and updating old software. However, as we relate […]