Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Seven Lines →

August 12, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Ancillary Equipment, Information Security, Signals

Another nearly perfect example of why signals (radio frequency electromagnetic communications) are a vital component of multilevel security in the environment you either work in, or are exploited by...

In this fascinating project by Columbia University's Intrusion Detection Lab doctoral student Ang Cui, comes a reminder that embedded componentry can be leveraged to leak the blather contained in silicon; and, astoundingly, all it took was seven lines of code. Absolutely Phenomenal.

August 12, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Ancillary Equipment, Information Security, Signals

...to the Battlements, Yonder!

June 16, 2015 by Marc Handelman in Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec

RAND Corporation, has published a not-entirely-surprising study targeting what appears to be the highly unsuccessful security postures of organizations under scrutiny. Entitled "The Defender's Dilemma: Charting a Course Toward Cybersecurity". Apparently, the notion of "Come And Take It" is not a particularly successful stratagem in modern electronic warfare...

Citation Libicki, Martin C., Lillian Ablon and Tim Webb. The Defender's Dilemma: Charting a Course Toward Cybersecurity. Santa Monica, CA: RAND Corporation, 2015. http://www.rand.org/pubs/research_reports/RR1024. Also available in print form.

June 16, 2015 /Marc Handelman
Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec

It Ain't Big, It's Large... Security Analytics →

May 27, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Information Security, SEIM
May 27, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Information Security, SEIM

Sophisticated Attack Myth, Hiding Unsophisticated Security Programs

May 11, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Information Security, Intelligence, Hiding In Plain Sight
May 11, 2015 /Marc Handelman /Source
All is Information, Alternate Attack Analysis, Information Security, Intelligence, Hiding In Plain Sight

SANS ICS Rebuttal of Norse Iran Report v1.1

SANS ICS Defense Use Case: The Norse / AEI Rebuttal →

April 29, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Information Security, ICS, ICS/SCADA

Superb rebuttal co-authored by Robert M. Lee, CAPT USAF (see Captain Lee's personal rebuttal of the NORSE and AEI document here), Michael J. Assante Co-Founder and Chief Security Strategist, NexDefense, Inc., and Tim Conway, ICS and SCADA Technical Training Director at SANS targeting the report entitled "The Growing Cyberthreat from Iran: The Initial Report of Project Pistaschio Harvest" produced by Norse and the American Enterprise Institute. Read it and Weep.

April 29, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Information Security, ICS, ICS/SCADA

Pinto's "A Deep-Dive on Machine Learning-Based Monitoring" →

April 07, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Computer Science, Compute Infrastructure, Information Security, Machine Learning
April 07, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Computer Science, Compute Infrastructure, Information Security, Machine Learning

Deployable Force Protection Adapter Red Team

March 30, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Red Team, War, Vulnerabilities, US Army, Physical Security, National Security, Information Security

United States Army Deployable Force Protection Adapater Red Team concept applied.

"They exposed weaknesses in the armor, illustrating that "we as scientists and engineers think we have a great solution and ha-ha moments, thinking Soldiers will love this" new piece of gear. Then the Red Team would show up and show all the weaknesses, she said, so "we started solving those problems." From that point on, anything deployed to small forward operating outposts of 300 people or less gets a Red Team going over from "the construct of the operational perspective, technology perspective, and how we could integrate it in such a way not to create inherent vulnerabilities. It's been very effective." - via David Vergun writing at the United States Army

March 30, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Red Team, War, Vulnerabilities, US Army, Physical Security, National Security, Information Security

Big Data Techniques for Cybersecurity →

March 15, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Security Tooling, Intelligence, Information Security
March 15, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Security Tooling, Intelligence, Information Security

Equation Group →

February 23, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, Espionage, Hardware Security, Information Security, Vulnerabilities, Malware

Going dark in 2014, the Equation Group's malware command and control servers have reportedly been migrated onto United States soil... This, after a nefariously successful run targeting thousands of victims in at least 40 countries. Focusing on vertical industry segments such as medical, telecom and aerospace sectors, including diplomatic missions, research institutions, military, governments, the Equation Groups' malware is apaprently fostering speculation as to connections between and betwixt US agencies.

"In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSA—but they provided detailed evidence that strongly implicates the US spy agency." - via ArsTechnica's Dan Goodin

February 23, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, Espionage, Hardware Security, Information Security, Vulnerabilities, Malware

Image via the Shodan Blog [https://shodanio.wordpress.com/]

Alert the Media: Shodan's New Webapp Deployed

February 05, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis, DevOps, Engineers, Information Security, Intelligence, Network Security, Hardware Security

Gotta appreciate those folks at Shodan. Their latest creation is a webapp, which permits easy data browsing. Along with their API, a deep-dive tool for quick, yet focused analysis. Outstanding work!

February 05, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis, DevOps, Engineers, Information Security, Intelligence, Network Security, Hardware Security

Fingerprint of Power

January 27, 2015 by Marc Handelman in All is Information, Alternate Attack Analysis

In which, a new analysis line-of-sight for the detection of attack, whether covert or otherwise. Absolutely fascinating ancillary evidentiary channel, utilizing power consumption differentiation between and betwixt infected and uncompromised systems. Outstanding.

January 27, 2015 /Marc Handelman
All is Information, Alternate Attack Analysis

Horror Vacui Intra Facinus →

July 30, 2014 by Marc Handelman in Crime, Cybernetic Crime, All is Information, Alternate Attack Analysis, Information Security

Brian Krebs illustrates a proliferation of legal businesses with nefarious polar-opposites as the lead-in to the main topic of that day's posting: An online service that will thoroughly deplete a targeted competitor's advertising budgets. While interesting in-and-of-itself, the topical post contains a sub-plot of existential interest. Curious? Read On.

The fascinating content of Mr. Krebs well-researched and concise post is not the miscreant service he describes in superb detail, but the notion of business/anti-business constructs [a la Matter/Antimatter, if you will...].

With the application of scrutiny (whether cursory or in-depth), researchers can locate exact, crime-laden copies of nearly every legit business or activity existing in the under-belly of our beloved Interweb. This behavior exactly matches the physical world, as the nature of the two opposing antagonists will expand to fill any empty space, vis-à-vis the concept of horror vacui.

July 30, 2014 /Marc Handelman
Crime, Cybernetic Crime, All is Information, Alternate Attack Analysis, Information Security
  • Newer
  • Older