Antivirus

Security community tools help intruders

To many ordinary home users and businesses, security software is nothing more than having antivirus protection and or endpoint security software. However, for enterprises the situation is more complex.I expect adversaries will continue to leverage publicly released tools, often developed by penetration testers and security researchers, to compromise and control targets worldwide. This trend, publicized most…


To many ordinary home users and businesses, security software is nothing more than having antivirus protection and or endpoint security software. However, for enterprises the situation is more complex.

I expect adversaries will continue to leverage publicly released tools, often developed by penetration testers and security researchers, to compromise and control targets worldwide. 

This trend, publicized most effectively by Mandiant’s Andrew Thompson, turns standard defensive thinking upside down. Unfortunately, it is difficult for those who work on the offensive side of the security team to recognize that this is the case.

The mantra for the past decade has been to “make intrusions more costly for the adversary.” One of the costs an intruder used to have to consider was the development of tools and techniques to compromise and control targets. 

However, today the majority of intruders operate publicly released tools to accomplish their goals. This means that intruders can radically decrease their research and development costs, as that burden has already been borne by penetration testers and security researchers.

About the author

Richard Bejtlich is principal security strategist at Corelight.

Public offensive tool releases

The argument in support of public offensive tool release usually offered by penetration testers and security researchers is that they are simply recreating capabilities already known and perhaps utilized by top tier intrusion groups. 

By releasing new capabilities, the argument goes, defenders learn what is possible and can develop mitigations that work against penetration testers and actual adversaries. 

Their scenario plays out in the following manner:

  • An enterprise deploys assets in

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

This hacker conference installed a literal antivirus monitoring system

Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived…

Organizers had a way for attendees to track CO2 levels throughout the venue—even before they arrived…
Read More

Continue Reading
Antivirus

Hackers abuse Triofox antivirus feature to deploy remote access tools

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet’s Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. …

Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet’s Triofox file-sharing and remote-access platform to achieve remote code execution with SYSTEM privileges. …
Read More

Continue Reading
Antivirus

Moonlock review: We put MacPaw’s new antivirus suite to work

Macworld At a glanceExpert’s Rating Pros Excellent viral and malware protection and detection Good purchase options Access to learning tools and YouTube links Cons Security Advisor module lacks functionality Menus don’t offer enough clarity sScan scheduler only allowing for 15-minute increments VPN auto-connects to the closest server Our Verdict Moonlock isn’t perfect…

Macworld

At a glanceExpert’s Rating

Pros

Excellent viral and malware protection and detection

Good purchase options

Access to learning tools and YouTube links

Cons

Security Advisor module lacks functionality

Menus don’t offer enough clarity

sScan scheduler only allowing for 15-minute increments

VPN auto-connects to the closest server

Our Verdict
Moonlock isn’t perfect…
Read More

Continue Reading
Antivirus

Avast Free Antivirus for Mac review: Basic protection, for free

Macworld At a glanceExpert’s Rating Pros Easy installation and setup Solid customization options such as whitelists, exceptions, and scheduled scans Handy network tools like Traffic Monitor and Network Inspector Cons Steady stream of ads, upgrade prompts, and assorted locked features The Web Guard module failed to catch obvious scam links The Scam Guard failed to

Macworld

At a glanceExpert’s Rating

Pros

Easy installation and setup

Solid customization options such as whitelists, exceptions, and scheduled scans

Handy network tools like Traffic Monitor and Network Inspector

Cons

Steady stream of ads, upgrade prompts, and assorted locked features

The Web Guard module failed to catch obvious scam links

The Scam Guard failed to detect scam…
Read More

Continue Reading