October 18, 2018 | Jose Manuel Martin

Detecting Empire with USM Anywhere

Empire is an open source post-exploitation framework that acts as a capable backdoor on infected systems.  It provides a management platform for infected machines. Empire can deploy PowerShell and Python agents to infect both Windows and Linux systems.Empire can:Deploy fileless agents to perform command and control. Exploit vulnerabilities to escalate privileges. Install itself for persistence. Steal user…

October 17, 2018 | Kate Brew

Best Cloud Tech Jokes and Memes

We ran a contest in Spiceworks recently, asking folks for their best cloud tech jokes. Here are some of the funniest ones:Those SpiceHeads sure have great senses of humor, of a highly techie variety! …

Get the latest security news in your inbox.

Subscribe via Email

October 16, 2018 | Javvad Malik

AT&T Business Summit 2018 - First Impressions and Recap

From the 25th to the 28th of September 2018, I had the opportunity to attend the AT&T Business Summit in Dallas.I walked away with a whole new perspective on AT&T business, what a conference could be like, and the Dallas Cowboys.The Future is HereThe show floor at the summit was small when compared to…

October 15, 2018 | Kate Brew

Security Travel Tips

In honor of NCSAM, we decided to ask the Twitter community for security travel tips, to help us be more safe when travelling. Here's the original Tweet:Want some AlienVault swag? Send us your top tip for #security while traveling by October 8 for potential inclusion in an upcoming blog. Of the tips we include in the blog, we&rsquo…

October 12, 2018 | Javvad Malik

Things I Hearted this Week, 12th October 2018

What is a Vulnerability?The part that most people don’t seem to understand enough is that an attack only matters if something is at stake. A transaction of some sort needs to occur, otherwise it doesn’t matter if someone performs the particular attack against you.When is a vulnerability not a vulnerability? | Medium, Tanya JancaAn…

October 11, 2018 | Jake Mosher

AlienVault Product Roundup – the Latest Updates!

September was another busy month for product development at AlienVault, an AT&T Company.  We are excited that the AlienVault Agent is getting great traction with our USM Anywhere user base, and we are continuing to add feature enhancements to the Agent. You can keep up with all of our regular product releases by reading the release notes…

October 10, 2018 | Bob Covello

Time to Cover your Selfie Camera

I am reading an excellent book named “Cringeworthy:  A Theory of Awkardness”, which examines exactly as the title describes, awkward situations and how to deal with them.  I love reading non-fiction books that are not InfoSec related.  There is so much to learn out there about so many topics.  Sometimes, however, I am led…

October 9, 2018 | Matt Klassen

5 Steps to Maximize Your Financial Data Protection

A series of high-profile data breaches in 2017 made it clear that it's becoming more difficult to protect your and your customer's sensitive information from nefarious agents. As businesses expand, they develop and implement security policies that help protect their sensitive information from outsiders. Still, business growth means more computers, more laptops and more mobile phones—and more…

October 8, 2018 | Chris Doman

Delivery (Key)Boy

IntroductionBelow we’ve outlined the delivery phase of some recent attacks by KeyBoy, a group of attackers believed to operate out of China. They were first identified in 2013 targeting governments and NGOs in South East Asia. Their primary targeting continues to this day, though they have also been known to target more diverse victims such as the energy…

October 8, 2018 | Holly Barker

AlienVault at SpiceWorld 2018 this Week!

SpiceWorld is taking place next week in Austin, TX! For those unfamiliar, the event is Spiceworks' yearly conference for IT pros and bacon lovers.The AlienVault team is ready to meet and greet their favorite SpiceHeads, new and old, at the Austin Convention Center, October 8th-10th! The conference features educational IT sessions, networking opportunities and a two-day expo…

October 5, 2018 | Javvad Malik

Things I Hearted this Week: 5th Oct 2018

There was no update last week because I was in Dallas for the AT&T Business Summit which was a great event. Chuck Brooks wrote a detailed post on his experience, while I made a couple of videos charting my time.But enough of that, lets see what went down in the world of security over these last few…

October 4, 2018 | Marcus Carey

Top Five MITRE ATT&CK Framework Use Cases

What is the MITRE ATT&CK?The MITRE ATT&CK framework is abuzz in the cybersecurity industry lately, and its utility has a lot of professionals excited. The ATT&CK framework predecessor was the Cyber Kill Chain developed by Lockheed-Martin in 2011.ATT&CK incorporates what MITRE calls Tactics and Techniques to describe adversarial actions and behaviors.…

Watch a Demo ›