Blog

The Latest from Fortify


Threat Feeds
CVE Feed
Loading...

CERT Vulnerability Feed
Loading...

CERT Insider Threat

Insider Threats in the Federal Government (Part 3 of 9: Insider Threats Across Industry Sectors)

The CERT National Insider Threat Center (NITC) Insider Threat Incident Corpus contains over 2,000 incidents, which, as Director Randy Trzeciak ...
Read More

Classifying Industry Sectors: Our New Approach to an Industry Sector Taxonomy (Part 2 of 9: Insider Threats Across Industry Sectors)

As Randy Trzeciak mentioned in the first blog in this series, we are often asked about the commonalities of insider ...
Read More

Is Compliance Compromising Your Information Security Culture?

Individual organizations spend millions per year complying with information security mandates, which tend to be either too general or too ...
Read More

Insider Threat Incident Analysis by Sector (Part 1 of 9)

Hello, I am Randy Trzeciak, Director of the CERT National Insider Threat Center (NITC). I would like to welcome you ...
Read More

How CERT-RMM and NIST Security Controls Help Protect Data Privacy and Enable GDPR Compliance, Part 1: Identifying Personally Identifiable Information

The costs of the steady stream of data breaches and attacks on sensitive and confidential data continue to rise. Organizations ...
Read More

Challenges Facing Insider Threat Programs and Hub Analysts: Part 2 of 2

In the first post in this two-part series, we covered five unique challenges that impact insider threat programs and hub ...
Read More

Cybersecurity Architecture, Part 2: System Boundary and Boundary Protection

This post was also authored by Andy Hoover. In Cybersecurity Architecture, Part 1: Cyber Resilience and Critical Service, we talked ...
Read More

Challenges Facing Insider Threat Programs and Hub Analysts: Part 1 of 2

The purpose of this two-part blog series is to discuss five challenges that often plague insider threat programs and more ...
Read More
Loading...

ISC Bulletins

Community contribution: joining forces or multiply solutions?, (Sun, Nov 11th)

Today’s diary will be less technical than usual, and more “philosophical” let’s say (because, why not, we need those too ...
Read More

Video: CyberChef: BASE64/XOR Recipe, (Sat, Nov 10th)

I made a video for my diary entry "CyberChef: BASE64/XOR Recipe":   Didier Stevens Senior handler Microsoft MVP blog.DidierStevens.com DidierStevensLabs.com ...
Read More

New VMWare Advisory https://www.vmware.com/security/advisories/VMSA-2018-0027.html, (Fri, Nov 9th)

-- Tom Webb @twsecblog (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License ...
Read More

Playing with T-POT, (Fri, Nov 9th)

I was looking for a honeypot install that had great reporting and was easy to deploy. I ran across T-Pot ...
Read More

Tunneling scanners (or really anything) over SSH, (Wed, Nov 7th)

I am sure that many penetration testers among our readers try to minimize their travel. While many years ago we ...
Read More

Malicious Powershell Script Dissection, (Tue, Nov 6th)

Here is another example of malicious Powershell script found while hunting. Such scripts remain a common attack vector and many ...
Read More

Struts 2.3 Vulnerable to Two Year old File Upload Flaw, (Mon, Nov 5th)

Apache today released an advisory, urging users who run Apache Struts 2.3.x to update the commons-fileupload component [1]. Struts 2.3.x uses ...
Read More

Beyond good ol' LaunchAgent – part 1, (Sun, Nov 4th)

Last week, on the inception diary of this series [1], I’ve talked about LaunchAgent and LaunchDaemon, probably the most known ...
Read More
Loading...