John Wick E-book Scam Hits Amazon Kindle Store

Our Counterintelligence Team gathers information and conducts operations to identify threats to an organization so that they can better protect against malicious activity. We accomplish this by combining technology with skilled and experienced intelligence specialists. Our goal is to protect your data, your brand and your people.

Hamas Looks to Increase Funding Through Crypto-Currency

Our Counterintelligence Team gathers information and conducts operations to identify threats to an organization so that they can better protect against malicious activity. We accomplish this by combining technology with skilled and experienced intelligence specialists. Our goal is to protect your data, your brand and your people.

How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

As awareness about the importance of Privileged Access Management (PAM) and Privileged Identity Management (PIM) increases, (Gartner called it a top priority for cyber security in 2019), executives, IT security and operations teams are evaluating multiple options when selecting a PAM or PIM solution that would be best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your short list for consideration.

Bots are cheap and effective. One startup trolls them into going away

Bots are ruining the internet.

When they’re not pummeling a website with usernames and passwords from a long list of stolen credentials, they’re scraping the price of hotels or train tickets and odds from betting sites to get the best data. Or, they’re just trying to knock a website offline for hours at a time. There’s an entire underground economy where bots are the primary tools used in automating fraudulent purchases, scraping content and launching cyberattacks. Bots are costing legitimate businesses money by stealing data, but also hogging system resources and costly bandwidth.

SAS preview: Vitaly Kamluk

The 2019 edition of the Kaspersky Lab Security Analyst Summit (aka #TheSAS2019), will take place in Singapore from April 8 to 11. As always, the conference will bring some of the brightest minds in infosec together to share knowledge at a high level.

Houzz Data Breach

The home improvement site Houzz announced a data breach this week involving third-parties gaining access to a file that contains publicly visible user data as well as private account information. In an email sent to affected users, Houzz stated that an unauthorized third-party gained access to a file containing both publicly available information as well as internal account information such as user IDs, email address, one-way encrypted passwords, IP addresses, city and zip codes derived from IP addresses, and Facebook information.

It’s Time to Modernize Traditional Threat Intelligence Models for Cyber Warfare

When a client asked me to help build a cyberthreat intelligence program recently, I jumped at the opportunity to try something new and challenging. To begin, I set about looking for some rudimentary templates with a good outline for building a threat intelligence process, a few solid platforms that are user-friendly, the basic models for cyber intelligence collection and a good website for describing various threats an enterprise might face. This is what I found:

Vuln: SSSD CVE-2018-16838 Security Bypass Vulnerability

SSSD CVE-2018-16838 Security Bypass Vulnerability
Bugtraq ID: 106840
Class: Access Validation Error
CVE: CVE-2018-16838
Remote: Yes
Local: No
Published: Feb 04 2019 12:00AM
Updated: Feb 04 2019 12:00AM
Credit: Redhat.
Vulnerable: Redhat Virtualization 4
Redhat SSSD 0
Redhat Enterprise Linux 7
Not Vulnerable:

Celebrate Safer Internet Day with a deal on this top VPN

Happy Safer Internet Day! Not so much a holiday as a day to look over our shoulder and remember that more than ever, the anonymity and freedom the internet once took for granted is under attack. Whether you’re worried about hackers, malware, or just the steadily increasing access big companies have to your online persona, the time has never been better to hop on a virtual private network. And just for the occasion, you might want to take a look at Disconnect VPN.

2019 Digital Identity Progress Report

Schools out for summer?  Well not quite.  Unless you’re living in the east coast of Australia, it’s looking decidedly bleak weather wise for most of Europe and the American east coast.  But I digress.  Is it looking bleak for your digital identity driven projects?  What’s been a success, where are we heading and what should we look out for?