Hello! This is jfer from compsec direct. I would like to show you how to leverage the new Kerberos exploit against Windows domain controllers called ms14-068. This vulnerability allows a user with domain credentials to forge a Kerberos ticket and receive domain admin privileges via the forged ticket. I want to thank Sylvain Monné aka Bidord [...]
Excellent post associating the attributed costs of security breaches over time.
Old-school exploits used in new ways are placing fresh demands for intel-sharing among infosec pros and their time-tested and next-gen security products Read More
Please take time to read this insightful publication by David Emm, Roman Unuchek, Victor Chebyshev, Maria Garnaeva and Denis Makrushin from Kaspersky Labs. The publication offers unparalleled insight and examples of current evolving threats through the info sec lens. Click here to download
Despite numerous public takedowns, cyber criminals will continue to extort users by leveraging their own data as ransom. Click Here for Original Post
According to the study by ISACA, 15% of companies are prepared, or feel prepared to handle APT's. Download Report Here
Good presentation from Bit9 on using sandboxing to potentially identify APT's. Click Here
I recall seeing a NASDAQ trading blackout a few months ago. Although NASDAQ claimed the 4 hour blackout was the result of a high speed trading glitch, it is more probable that these incidents are related given this article. See full article here: http://arstechnica.com/security/2014/07/how-elite-hackers-almost-stole-the-nasdaq/