The First Major Security Logos of 2018: Spectre and Meltdown Vulnerabilities
January 4, 2018This post was updated on Jan. 12, 2018 to include additional technical details and supplemental links. The recently disclosed Meltdown and Spectre vulnerabilities started off 2018 with a sombe...
Triton: What You Need to Know
January 2, 2018Correction: An earlier version of this post identified the protocol used as the TSAA protocol. This malware uses the TriStation protocol, which is proprietary and undocumented. Thanks to Jimmy Wylie f...
Auditing Kubernetes for Secure Configurations
December 28, 2017Over the last few years, container technology has gained traction in enterprise environments. And, as a result, use of containerized applications has exploded in the enterprise. Naturally, as its adop...
Petya/NotPetya Ransomware Detection for the Modern Enterprise
June 27, 2017A new version of the Petya malware is spreading globally, including the European Union, Ukraine and Russia. It has already impacted many organizations, both large and small, and has compromised system...