Get In Touch
A few years ago, I wrote a blog post trying to explain, with humor, why choosing application security as a career path is destiny derived by my parents calling me "Or", and why a personal name that is a conditional word can sometimes be challenging in daily routines, since some attack payloads contain conditional words.
When we write the SOTI and talk about attacks against gamers, we spend a good deal of time focusing on network-level events, such as DDoS and credential stuffing. These are serious types of attacks and attack surfaces, but they aren't the only things gamers have to deal with. In fact, the add-on attacks are far more common than one would imagine.
Kathryn Kun, the XO of the Office of the CSO, joins Martin and Steve for a discussion about people management, and the challenges associated with such tasks. The three also discuss ice fishing, and the fact that some ice fishing setups include cable TV.
I recently wrote about why I hate security predictions. I hate being asked to make them, I dislike reading many of them, and I think a lot of what we think of as "predictions" are simply extensions of the analysis security researchers and analysts are doing on a daily basis. This brings me to the conclusion that I actually hate the framing and connotation of predictions, rather than the actual
Steve, Martin, and Amanda talk about what it's like to edit a report the size of the SOTI, and Amanda discusses her strategies for getting the most out of your security blogging efforts.
In our first blog post, we explained DGA evasion techniques and discussed different methods for detecting DGA-based malware. We also elaborated on our own solution, a deep learning neural network that predicts over Akamai's extensive DNS traffic. A solution that currently autonomously blocks more than 70 million DNS requests daily, with very low positive rate. Another exciting aspect of this system was the detection of thus far undetected botnets, with
Security predictions have been a staple of news in the security industry for as long as I've been in this profession. I hate them. Every December and January, there's a spate of stories written about what the "experts" expect for the upcoming year. With rare exceptions, they fall into one of three categories: more of the same, growth in a specific attack type, or "the year of" . Some of
An examination of exploits used by the KashmirBlack botnet Not too long ago, I read a couple of excellent articles by Sarit Yerushalmi and Ofir Shaty on their research of the KhasmirBlack botnet, which are published here and here. Their articles described the KashmirBlack botnet infecting sites via various exploitable WordPress plugins. One of the things I noticed is that the botnet used some of my own vulnerability disclosures, so
This year has been a strange one. For the final podcast of 2020, Martin and Steve look back on everything that happened this year, and offer some thoughts and advice for 2021. Thanks for listening! We'll see you soon.