Blog

Maintaining a SOC (with Rob Gresham)

Threat Intelligence (with Rob Gresham)

THREAT INTELLIGENCE (WITH Rob Gresham) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 36 GUEST:Rob Gresham February 13, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and …

Maintaining a SOC (with Rob Gresham)

BSides Huntsville & SDN (with Paul Coggin)

BSides Huntsville & SDN (WITH Paul Coggin) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 35 GUEST:Paul Coggin January 30, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and …

Maintaining a SOC (with Rob Gresham)

Red Teaming (with Joe Vest & James Tubberville)

Red Teaming (with Joe Vest & James Tubberville) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 34 GUEST:Joe Vest & James Tubberville January 23, 2017 If you enjoy this podcast, be sure to give …

Maintaining a SOC (with Rob Gresham)

Ransomware and Incident Response (with Ben Johnson)

Ransomware and Incident Response (WITH Ben Johnson) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 33 GUEST:Ben Johnson January 16, 2017 If you enjoy this podcast, be sure to give us a 5 Star …

Maintaining a SOC (with Rob Gresham)

Practical Packet Analysis (with Chris Sanders)

Practical Packet Analysis (with Chris Sanders) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 32 GUEST:Chris Sanders January 9, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review …

Maintaining a SOC (with Rob Gresham)

Infosec Success (with Lesley Carhart)

Infosec Success (with Lesley Carhart) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 31 GUEST:Lesley Carhart January 2, 2017 If you enjoy this podcast, be sure to give us a 5 Star Review and …

Maintaining a SOC (with Rob Gresham)

OSINT Framework (with Justin Nordine)

OSINT Framework (WITH Justin Nordine) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 29 GUEST: Justin Nordine December 19, 2016 If you enjoy this podcast, be sure to give us a 5 Star Review and …

Help Families Affected by the Smoky Mountain Wildfires

Help families Affected by the Smoky Mountain Wildfires If you’re a regular reader, you’ll know that I am not one to ask for help or money. I am not asking …

Maintaining a SOC (with Rob Gresham)

Lessons in Incident Response (with Ben Shipley)

Lessons in Incident Response (with Ben Shipley) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 27 GUEST: Ben Shipley NOVEMBER 28, 2016 If you enjoy this podcast, be sure to give us a 5 Star …

Maintaining a SOC (with Rob Gresham)

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl)

Multi-Tool Multi-User HTTP Proxy (with Russel Van Tuyl) IF IT’S A PROTOCOL, YOU CAN PLAY WITH IT ADVANCED PERSISTENT SECURITY PODCAST EPISODE 26 GUEST: Russel Van Tuyl NOVEMBER 21, 2016 If you …

Maintaining a SOC (with Rob Gresham)

OSINT, Social Engineering, & the Election (with Ed Porter)

OSINT, Social Engineering, & the Election (with Ed Porter) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 25 GUEST: Ed Porter NOVEMBER 14, 2016 If you enjoy this podcast, be sure to give us a …

Maintaining a SOC (with Rob Gresham)

Critical Security Controls: Part 2 (with Brian Ventura)

Critical Security Controls: Part 2 (with Brian Ventura) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 24 GUEST: Brian Ventura October 31, 2016 If you enjoy this podcast, be sure to give us a 5 …

Maintaining a SOC (with Rob Gresham)

Critical Security Controls: Part 1 (with Brian Ventura)

Critical Security Controls: Part 1 (with Brian Ventura) (WITH BRIAN VENTURA) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 23 GUEST: BRIAN VENTURA October 24, 2016 If you enjoy this podcast, be sure to give …

Maintaining a SOC (with Rob Gresham)

Women & Minorities in Technology (with Shana Bumpas)

Women & Minorities in Technology (WITH SHANA BUMPAS) ADVANCED PERSISTENT SECURITY PODCAST EPISODE 21 GUEST: Shana Bumpas October 3, 2016 If you enjoy this podcast, be sure to give us a 5 …

Maintaining a SOC (with Rob Gresham)

Lessons in Infosec (with Tracy Z. Maleeff)

Lessons in Infosec (with Tracy Z. Maleeff) Advanced Persistent Security Podcast Episode 18 Guest: Tracy Z. Maleeff September 12, 2016 If you enjoy this podcast, be sure to give us a …

Maintaining a SOC (with Rob Gresham)

Intro to App Sec (with Frank Rietta)

This episode we discuss Application Security (App Sec) from a high level and graze the surface on a few other vital security concepts and frameworks. We also discuss local happenings in the Security Community and other relevant topics in security.

US Elections Hacked?

Cybersecurity & the US 2016 Presidential Election

First, I would like to thank you for reading this blog post. It is the first of two, maybe more, parts. Before we get started, read the three disclaimers below. …

BSides Knoxville (with Roger Seagle)

CSA Treacherous 12 Concerns: 1-4

Cloud Security is nothing new. However, it is growing in implementation and popularity. This is causing a ripple effect in terms of attacks originating in the cloud, attacking assets in the cloud, and using cloud resources for availability attacks. The purpose of this podcast is to discuss the CSA Treacherous 12 Concerns.

Ransomware Gaining Momentum

Jam Session: Ransomware Threat In 2016

We all know that Ransomware is a PITA (Pain in the ___). This podcast, we discuss modern examples, infection vectors, mitigations, and root causes. This podcast is meant to start the discussion with management to begin to prevent malware infections instead of scramble to decrypt files or pay the extortionists.

Qatar Bank Breached after Bangladesh

Qatar Bank Breached After Bangladesh

Qatar Bank Breached After Bangladesh  It’s been quite the week for the banking industry with multiple headlining hacks occurring throughout the world with Qatar National Bank being the latest victim.  …

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD

Bangladesh Bank Loses 80 Million USD …with a $10 router …and NO firewall …We’re NOT making this up… The Bangladesh’s Central Bank was hacked in February 2016 that stole $80 million (they …

Maintaining a SOC (with Rob Gresham)

Mobile Insecurity (with Georgia Weidman)

Everyone wants to think about how secure they are. This podcast flips the script and assesses insecurity, specifically Mobile Insecurity. We discuss issues within the mobile computing ecosystem.

1. Current Event: Apple Quick Time and why could it not have been Flash. Georgia’s dad still uses Microsoft XP and won’t connect his printer to the network.
2. Georgia delivers her “Mobile Insecurity” talk and we discuss issues in the mobile threat landscape and possible mobile issues.
3. Mobile Malware, Ransomware, and MDM are discussed. Issues within the actual mobile Operating Systems are discussed briefly.
4. Joe asks if Georgia sees mobile devices distributing Ransomware and Malware to cars.
5. Quick banter of Apple vs FBI and the implications of the precedent both attempted and actually set.

AVG

AVG Exposes 9 Million Users’ Data with Chrome Plugin

AVG Exposes 9 Million Users’ Data with Chrome Plugin In today’s ever-growing cyber world, consumers look to cyber security giants for 24-hour support and protection, but we are constantly reminded …

4 Things to Know About Ransomware

Top 5 Cybersecurity Threats in 2015

Top 5 Cybersecurity Threats in 2015   In this week’s Top 5 review we will be discussing the Top 5 cybersecurity vulnerabilities and threats in 2015.  This isn’t designed to be …

U.S. House Approves E-Mail Bill

Congress Pushes Revamped CISPA

Congress Pushes Revamped CISPA It seems as if the US Congress is back in the business of making “powerful friends” again. By friends, I mean enemies. This time, it is …

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability

T-Mobile/Verizon Android Device LTE Security Vulnerability Carnegie Mellon University CERT database has published a vulnerability notice regarding the newest security vulnerability that affects Long Term Evolution (LTE) mobile networks. Per …

NSA breaks 1024-bit encryption

NSA breaks 1024-bit encryption | NSA

NSA breaks 1024-bit encryption According to a recent article by Alex Halderman and Nadia Heninger, what most people feared in the cryptography fields looks all too real, the NSA is in the …

Beware: US Elections Phishing, Malware, & Hoaxes

Donald Trump’s Hotels Infected with Malware

Everything seems to be going the right way for Presidential Candidate Donald Trump lately, until yesterday that is. Trump Hotel Collection (“THC”) released a legal statement (Trump Hotel Collection, 2015) …

Cyber Security and the Automobile Industry

Cyber Security and the Automobile Industry

Cyber Security and the Automobile Industry   In the wake of several other cyber security blunders in the automobile industry as of late, namely (Tesla) and (Chrysler), Volkswagen is now …