Forcepoint 2015 Threat Report

By |2022-06-15T00:55:26-04:00February 15th, 2016|Categories: Attribution, Cyber, Defensive Methodology, Forensic, Hacking, Hunting, Pen-testing, Reports, Tor|

An excellent publication from Forcepoint that covers CnC malware, malicious insiders and attribution. Unlike other threat reports, this report covers multiple human factors that are often neglected in technical reports. In some cases, human error and predisposition to reuse malware has lead thee researchers to determine a high probability of configuration reuse which leads to easier detection of [...]

Comments Off on Forcepoint 2015 Threat Report

Security firm sued for filing “woefully inadequate” forensics report -Arstechnica

By |2022-06-15T01:27:43-04:00January 15th, 2016|Categories: Breach, Forensic, Lawsuit|Tags: , , |

Arstechnica's Dan Goodin has reported that Trustwave is being sued by Affinity Gaming for not eliminating malware presence after a forensic investigation had been done. Mandiant uncovered the malware during a follow up PCI forensic investigation. See full-article below. Security firm sued for filing “woefully inadequate” forensics report

Comments Off on Security firm sued for filing “woefully inadequate” forensics report -Arstechnica
Go to Top