Bypassing Perimeter Security and Malware Evasion (2)

This post is a continuation of Bypassing Perimeter Security and Malware Evasion (1) As discussed before the best way to understand how drived by downloads technique work to bypass modern cyberdefenses is with a network traffic analysis exercise. The get a full understanding of the technique we will have to look for answers to some … Continue reading Bypassing Perimeter Security and Malware Evasion (2)

Computer network defense operations, disrupting the enemy’s attack

In the last couple of weeks I have been reading different white papers related to network computer defense and the general idea in all of them is that the industry is moving towards a dynamic approach to computer network defense. In the past, IT would be dealing with the defense of corporate networks however that … Continue reading Computer network defense operations, disrupting the enemy’s attack

Bypassing Perimeter Security and Malware Evasion (1)

I could have titled this article in many ways such as perimeter disintegration, endpoint security visibility still a problem or even exploit kit. The reality is that all of them are part of a bigger problem and it is how criminals are bypassing the security perimeter and getting inside the networks where organization┬┤s most precious … Continue reading Bypassing Perimeter Security and Malware Evasion (1)

Anatomy of one of the best professional hackers for hire organizations

Apparently one of the bigges APT in the scene is a group of hackers for hire based in China and called by the community the Hidden Lynx. This groups is one of the most sophisticated advanced persistent threats that organizations from all over the world are fighting.The team seems to be based in China, have … Continue reading Anatomy of one of the best professional hackers for hire organizations