All Aboard the Hype Train: DefCon 22 Has Arrived


This entry was posted by on .
SHAREShare on FacebookShare on LinkedInTweet about this on TwitterShare on Google+Email this to someone

SCADA is Bigger Than Ever at DefConDefCon 22 is one of the largest and most recognized hacker events of the year, hosted at the Rio in Las Vegas, NV.  In the past few years, the con has brought in 12,000+ hackers, feds and everyone in between to share ideas, tools and new tactics for defeating (and protecting) security measures and controls.  Recently there has been an increase in talks related to control systems.  For example, here’s this years list of SCADA-related talks –

read more

Havex: Interesting in a Different Way


This entry was posted by on .
SHAREShare on FacebookShare on LinkedInTweet about this on TwitterShare on Google+Email this to someone

Lot’s of news recently about a resurgence of the Havex malware.  Here’s why (and why you should care)

‘Old’ Attack Vectors

There are a number of tried and true ways to get malware onto a target system, most common is via email.  The attacker sends an email to the target with a file and hopes the target opens that attachment.  There are a few tricks to this: Email Attachment
  1. Hope the target environment doesn’t block your attachment
  2. Because of point 1, attacker has to use malware embedded in a common file format, such as pdf/doc/xls
  3. Reliability of the malware reduces (as a result of point 2)
Attacker Used Spam!  It's Not Very Effective

Attacker Used Spam! It’s Not Very Effective

An alternate to plain attachment vectors is to insert a web link that sends the target to a malware infested domain.  A bit more sophisticated, this domain can now collect browser/system information and craft the malware page accordingly.  Attacker still has to rely on the target: Link to Malware Site
  1. Receive the email
  2. Recognize it’s not spam
  3. Click the link
  4. Interact with popups/alert boxes in order to install the malware

read more

Pictures from Gartner Security & Risk Management Summit 2014


This entry was posted by on .
SHAREShare on FacebookShare on LinkedInTweet about this on TwitterShare on Google+Email this to someone

Thanks to everyone who visited our booth at the Gartner Security & Risk Management Summit.  Here are a few pictures from the summit –

AlertEnterprise™ Demonstrates First Enterprise-Proven IT-OT Security Intelligence Platform at Gartner Security & Risk Management Summit, June 23-25


This entry was posted by on .
SHAREShare on FacebookShare on LinkedInTweet about this on TwitterShare on Google+Email this to someone

psim

Enterprise Sentry™ Delivers Unified Critical Infrastructure Protection across Cyber, OT / SCADA and Physical Security

National Harbor, MD — June 23, 2014: AlertEnterprise, today, announced the first proven IT-OT (Operational Technology) Security Convergence Platform at Gartner Security & Risk Management Summit. Now operating in high security environments, the Enterprise Sentry offering meets Gartner’s rigorous definition of Cybersecurity revised to include IT Security, OT Security and Physical Security.

read more