Limiting Windows Local Administrator Rights
One of the common issues we run into during security assessments and incident response cases is the issue of users being assigned too many permissions on their local computer. For…
One of the common issues we run into during security assessments and incident response cases is the issue of users being assigned too many permissions on their local computer. For…
Yesterday, DARPA and MIT announced the results of a project that has been in development which would allow an organization’s network to function even while under an active attack from…
A couple weeks ago I posted a blog article with some sample file hashes and domain names associated with the recent Google hacks (think APT or Aurora). More information on…
Obviously there has been a lot of discussion in the news, on blog posts, even tweets, on the issue of the Aurora attacks and what they mean. This is certainly…
McAfee has recently released specific details about their analysis of the Aurora malware that was used to compromise 30+ companies over the past few months. This malware is consistent with…
One of the issues that we have been dealing with extensively lately is the issue of auditing and automation. This has come most often been raised when we’ve been discussing…