When I Attack, Part 2 – Climbing Up the Kill Chain
by Keith Wilson
I’m back this week and moving swiftly up the Kill Chain. In my previous post, I detailed what an advanced attacker would do during the reconnaissance phase of the Security Kill Chain. READ MORE

The Role of Metadata Analysis in Information Security

In a recent survey conducted by Lancope, the insider threat was a major concern for respondents, with 40 percent citing it as a top risk to their organization. Recent news events such as the WikiLeaks disclosures have also brought the insider threat into focus. READ MORE

Insider Threats Part 2 - What Can We Do About It?

In a recent survey conducted by Lancope, the insider threat was a major concern for respondents, with 40 percent citing it as a top risk to their organization. Recent news events such as the WikiLeaks disclosures have also brought the insider threat into focus. READ MORE

Insider Threats Part 1 - Who Is Attacking Your Network?

In a recent survey conducted by Lancope, the insider threat was a major concern for respondents, with 40 percent citing it as a top risk to their organization. Recent news events such as the WikiLeaks disclosures have also brought the insider threat into focus. READ MORE

When I Attack - The Diary of an APT as it Moves Up the Kill Chain

I'm going to be speaking from the point of view of an attacker. But not just any attacker. I’m looking through the eyes of what our industry has deemed an Advanced Persistent Threat (APT). This is the beginning of a series of posts that will discuss what I will do as I move through the Kill Chain. READ MORE

Thwarting Zeus Gameover’s Extra Life with SLIC

A new variant of the Zeus Gameover malware has been discovered, which we are calling "Extra Life." Earlier this morning, we began to include the domains from Extra Life’s DGA in our StealthWatch Labs Intelligence Center (SLIC) Threat Feed. READ MORE