Digitally Signed Malware Proves Again That Attacks Get Through Your Shields

by

Digitally Signed Malware

So what, Triumfant guy, exactly gets through my shields?  You tell me I will be breached and you give me statistics, but I have AV, whitelisting, deep packet inspection, and every other acronym and buzzword in place. Oh yea, and I have “the cloud” (pause for tympani emphasis) providing me prevalence information and other cloud-based stuff. Well, … [Read more...]

I Smell a RAT – Breaking Into Your House to Prove a Point About Breaches

by

triumfant-blog-thumbnail

I am going to break into your house.  This is obviously a hypothetical, so there is no need to report me to the local authorities. But stay with me. As I said, I am going to break into your house.  I can get in one of two ways.  I could use simple psychology to entice you to essentially opening the door and letting me in (social engineering) or … [Read more...]

The Worldwide Malware Signature Counter Lives On

by

triumfant-blog-thumbnail

At the bottom of the Triumfant home page is the Worldwide Malware Signature Counter, a fixture on the site since May of 2009.  The Counter was designed, according to the associated blog post marking its debut, “to graphically reinforce what many in the IT security industry believe is a growing problem that is being largely ignored – that the … [Read more...]

RSA Conference 2012 Fearless Forecast – The Cloud of FUD

by

triumfant-blog-thumbnail

Next week, something insidious and life-choking will settle over the San Francisco Bay area and threaten everyone with confusion, nausea, and full loss of body hair. The cloud of FUD. For you South Park fans, yes, this is far more dangerous than the Cloud of Smug introduced in one of the classic South Park episodes (The Perfect Storm of Self … [Read more...]

The Evidence is Overwhelming: Organizations are not Prepared for the Inevitable Breach

by

triumfant-blog-thumbnail

84 and 173.5. These are two significant statistics I picked up from the “Trustwave 2012 Global Security Report”.  I downloaded the report yesterday to review the analysis and the salient numbers from the study.  If you read this blog, you know I quote liberally from the Verizon Business "2011 Data Breach Investigations Report”.  I felt it … [Read more...]

Prediction Regarding Data Breach Detection – Soon to be a Regulatory Requirement

by

triumfant-blog-thumbnail

In a post last week titled "Proposed EU Data Protection Fines Push the Lack of Breach Detection Capabilities into the Light", I noted that the proposed European Union data protection rules would impose fines against organizations who did not report data breaches in a timely manner.  After that post I came across a story ("Companies worry about … [Read more...]

Hearing the Sound of Inevitability – Rapid Detection and Response

by

Matrix_subway

It appears that the IT security market maybe finally hearing the sound of inevitability. In an InformationWeek article by Matthew J. Schwartz called “10 Security Trends To Watch In 2012”, Schwartz puts “Breaches now inevitable, say businesses” as number 1.  Number 1! Finally the message seems to be permeating the years of flat earth thinking in … [Read more...]

Story on Targeted Attacks Dispels the Presumption of Complexity

by

Cluttered_Workbench

I came across a story today that really speaks to the mythology of targeted attacks and their much-hyped subset, the Advanced Persistent Threat.  In a story on the Threatpost Blog by Paul Roberts (@paulroberts) called "Attackers Reused Adobe Reader Exploit Code From 2009 In Extremely Targeted Hacks", Roberts provides insightful details on a … [Read more...]

RFIs – You Don’t Know What You Don’t Know

by

gordian_knot

RFI’s drive me crazy. First, I think the concept is a Gordian knot.  I need to learn about something I do not know.  I will learn by asking questions in a static, rigid format.  Okay, but if you don’t know about something, how can you hope to ask the right questions to get the information you need, or hope that your questions don’t inhibit … [Read more...]

The American Airlines Phishing Attack – Front Row Seat to the Psychology of an Attack

by

triumfant-blog-thumbnail

Today I came face to face with the phishing attack and was able to watch firsthand as the attack worked on the human element of IT security.  This morning I contacted by a friend who had received an email that confirmed the purchase of a flight on American Airlines.   The friend was now convinced that a credit card had been compromised and that … [Read more...]