Keeping AWS Safe in an Unsafe World

~ by Michael Bailey Introduction As more businesses transition to the cloud, administrators find themselves in a position where they have to secure resources well beyond their previous network perimeter prior to adoption.  Despite the fact that, as a whole, AWS can often be easier to manage than man...

Looking to secure O365? PowerShell can be your friend.

~by  Britton Manahan While Microsoft Office 365 (“O365”) has become enormously popular as an application for businesses of all sizes, it has also created significant opportunities for cyber criminals to mount what are now known as Business Email Compromise attacks. These typically begin with fraudul...

PowerShell and Malicious O365 Email Rules

~ by Britton Manahan Introduction Everyday more and more companies are taking advantage of the benefits offered by cloud-based solutions. Security for these different cloud services is often misunderstood, and threat actors have taken notice. One of the most common cloud offerings is Office 365 (O36...

Beware of the Office 365 Compromise

There’s an old saying that a bad day fishing is better than a good day doing anything else. Many cyber thieves might agree that applies to phishing, as well, particularly if they put some extra effort into their endeavor.

Counter-Punching Anti-Debugging Methods with WinAppDbg and Python - Part 1

~ by Britton Manahan Introduction Advanced dynamic malware analysis through debugging can unlock invaluable insights into an unknown binary. However, sophisticated malware authors aren’t going to simply allow their programs to hand over their secrets to a debugger. Many of the anti-debugging techniq...

Are you Ready for GDPR?

The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy for all individuals within the EU’s 28-member countries. When it goes into effect on May 25, 2018, it will require companies that collect personal data on European Union citizens to comprehens...

The Axis of Hack-sis?

Recent events are bearing out the Worldwide Threat Assessment of the U.S. Intelligence Community, delivered to Congress in February by the Director of National Intelligence Dan Coats, which pointed a finger at Russia, Iran and North Korea as states that are using cyber operations as a low-cost tool ...

Crackin’ the KRACK Attack

Author: Matt Ahrens Published: 10/18/17

How to Avoid Wannacry

Author: Matt Ahrens Published: 05/13/17

Top Cybersecurity Trends to Watch in 2017…and How to Prepare

Author: Jason Rebholz Published: 01/10/17