Browsed by
Category: Uncategorized

2019 Verizon DBIR Key Findings

2019 Verizon DBIR Key Findings

Two Trends and Themes Worth Thinking About Why do we all get so excited about the Verizon Data Breach Investigations Report (DBIR) every year? For me, it’s not just the subject matter. It’s mostly the snarky tone and the pop-culture references. Call it what you will, but the injection of humor into an otherwise serious set of findings of our seemingly collective ineptitude makes it at least palatable to read and thus easier to digest. Seriously though, while it’s not…

Read More Read More

Anatomy of a Hack: How TEMP. Mixmaster Attackers Use TrickBot and Ryuk to Poach Big Game

Anatomy of a Hack: How TEMP. Mixmaster Attackers Use TrickBot and Ryuk to Poach Big Game

Cyber-crime continues to evolve – especially over the last year in terms of ransomware. Ransomware used to be largely a spray-and-pray proposition where attackers used automated tools to spread and encrypt as fast as possible, with immediate ransom demands. Those did enough damage. However, cybersecurity researchers are reporting a new, more patient and human-driven extortion scheme where criminals infect many networks but only select larger organizations with deeper pockets. In these larger target networks, they may dwell for as long…

Read More Read More

Taking a Data Centric Audit and Protection (DCAP) Approach Avoids the Weaknesses of a Siloed Data Security Strategy

Taking a Data Centric Audit and Protection (DCAP) Approach Avoids the Weaknesses of a Siloed Data Security Strategy

Data Centric Audit and Protection (DCAP) is a term defined by Gartner back in 2017 in response to the weaknesses of the Data Security Governance practices at the time. At that time, data protection strategies focused on the security of the application, or storage system that contained the data. This focus led to a variety of technology-specific security tools which tended to be owned and managed by different teams within IT. This siloed approach to data security worked well as…

Read More Read More

Unconstrained Delegation Exploit

Unconstrained Delegation Exploit

Microsoft released another security advisory today that affects Active Directory security. Similar to the Exchange advisory, this is coming from research done by third-party security researchers.  Here is the original post explaining the exploit. In addition, a more detailed explanation of the conditions and setting necessary for this attack to occur was posted by Roberto Rodriguez, a colleague of harmj0y’s at Specterops: Hunting in Active Directory: Unconstrained Delegation & Forests Trusts Microsoft was first notified of this attack back in October…

Read More Read More

5 Cybersecurity Trends for 2019

5 Cybersecurity Trends for 2019

As we kick off 2019, we are excited to bring you our 3rd Annual “STEALTHbits’ Experts Predictions”. This has been such a crowd pleaser that we just had to keep it going! Like the last few years, we made our way around the office with left over holiday cookie bribes to get the voice of STEALTHbits regarding the future of cybersecurity. So, read on…because you don’t want to miss these wise and insightful opinions on which trends will emerge in…

Read More Read More

EU GDPR: Paving the Way for New Privacy Laws?

EU GDPR: Paving the Way for New Privacy Laws?

The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.” In what could end up…

Read More Read More

ProTip: Eliminating Weak Active Directory Passwords

ProTip: Eliminating Weak Active Directory Passwords

Here’s a quick way to identify accounts with bad passwords in your Active Directory (AD). If you’re running StealthAUDIT for Active Directory, this is a very effective yet low-effort way to eliminate compromised passwords from your domain. Finding the bad passwords: From your web browser, click through the report tree down to the Active Directory>Users section. The report you want is called ‘Weak Password Checks.’ One of the checks in this report performs a hash comparison between your AD passwords…

Read More Read More

Announcing STEALTHbits Activity Monitor 3.0 & StealthINTERCEPT 5.1

Announcing STEALTHbits Activity Monitor 3.0 & StealthINTERCEPT 5.1

The STEALTHbits team remains keenly focused on delivering world-class activity monitoring and threat analytics solutions to our customers, which is why we are proud to announce the release of STEALTHbits Activity Monitor 3.0 and StealthINTERCEPT 5.1. Both of these releases come with several key updates and expanded platform support. STEALTHbits Activity Monitor 3.0 The STEALTHbits Activity Monitor provides operational efficiencies and visibility into a wide spectrum of human and machine data interactions with a standardized format. With the introduction of…

Read More Read More

Key Take Aways from the Ponemon 2018 Cost of Insider Threats Report

Key Take Aways from the Ponemon 2018 Cost of Insider Threats Report

Since 2016 the Ponemon Institute has released a yearly report on the cost of insider threats, and this year’s report covered some statistics that may surprise you. Most people relate to incidents and breaches that originate from outside the organization. Practitioners, however know that they cannot focus only on the outsider threat but also the threat from insiders and how costly it can be. The Ponemon Institute was able to shine some much needed light on the cost occurred by…

Read More Read More

Where Real Organizations Are with EU GDPR 10 Days from Launch

Where Real Organizations Are with EU GDPR 10 Days from Launch

I’m writing this sitting in Germany, having spent one week meeting with customers from the UK, Switzerland, and other places and about to spend another at the Kuppinger Cole EIC Conference. The conference agenda is loaded up with EU GDPR topics, and there will be more to say about that in another post. It was very interesting last week to hear from customers, prospects, and partners where their GDPR efforts are right now. With the May 25th date looming, it would be easy to expect…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.