Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Stop Saying Stegosploit Is An Exploit

Security researcher Saumil Shah recently presented “Stegosploit” (slides available here). His presentation received a lot of attention on several hacker news sites, including Security Affairs, Hacker...

View Article


OPM Breach: Corporate and National Security Adversaries Are One and the Same

On June 5, 1989, images of a lone person standing ground in front of Chinese tanks in Tiananmen Square transfixed the world. On the same day twenty-six years later, the United States government...

View Article


The Digital Domain’s Inconvenient Truth: Norms are Not the Answer

To say the last week has been a worrisome one for any current or former federal government employees is a vast understatement. Now, with this weekend’s revelations that the data stolen in the OPM...

View Article

Image may be NSFW.
Clik here to view.

Data Science for Security: Using Passive DNS Query Data to Analyze Malware

Most of the time, DNS services—which produce the human-friendly, easy-to-remember domain names that map to numerical IP addresses—are used for legitimate purposes. But they are also heavily used by...

View Article

Image may be NSFW.
Clik here to view.

Meet Endgame at Black Hat 2015

 Endgame will be at Black Hat!Stop by Booth #1215 to:GET AN ENDGAME ENTERPRISE DEMOSign up here for a private demo to learn how we help customers automate the hunt for cyber adversaries.  MEET WITH...

View Article


Image may be NSFW.
Clik here to view.

Examining Malware with Python

Before I came to Endgame, I had participated in a couple of data science competitions hosted by Kaggle. I didn’t treat them as competitions so much as learning opportunities. Like most things in the...

View Article

Why We Need More Cultural Entrepreneurs in Security & Tech

Recently, #RealDiversityNumbers provided another venue for those in the tech community to vent and commiserate over the widely publicized lack of diversity within the industry. The hashtag started...

View Article

Image may be NSFW.
Clik here to view.

Sprint Defaults and the Jeep Hack: Could Basic Network Settings Have...

In mid-July, research into the security of a Jeep Cherokee was disclosed though a Wired article and subsequent Black Hat presentation. The researchers, Charlie Miller and Chris Valasek, found an...

View Article


Black Hat 2015 Analysis: An Island in the Desert

This year’s Black Hat broke records yet again with the highest levels of attendance, including highest number of countries represented and, based on the size of the business hall, companies represented...

View Article


Image may be NSFW.
Clik here to view.

NLP for Security: Malicious Language Processing

Natural Language Processing (NLP) is a diverse field in computer science dedicated to automatically parsing and processing human language. NLP has been used to perform authorship attribution and...

View Article

Image may be NSFW.
Clik here to view.

Hunting for Honeypot Attackers: A Data Scientist’s Adventure

The U.S. Office of Personnel Management (known as OPM) won the “Most Epic Fail” award at the 2015 Black Hat Conference for the worst known data breach in U.S. government history, with more than 22...

View Article

Three Questions: Smart Sanctions and The Economics of Cyber Deterrence

The concept of deterrence consistently fails to travel well to the cyber realm. One (among the many) reasons is that, although nuclear deterrence is achieved through nuclear means, cyber deterrence is...

View Article

A Keynesian Approach to Information Freedom

A free and open Internet is the cornerstone of net neutrality, advocated by civil liberties groups and the US government alike. A wide range of actors have taken this concept to the extreme by publicly...

View Article


A New Year, A New Normal: Our Top Cybersecurity Predictions for 2016

Each of the last several years has been dubbed the “year of the breach,” or more creatively the “year of the mega-breach.” But instead of continuing this trend and calling 2016 the “year of the...

View Article

Image may be NSFW.
Clik here to view.

How Banks' Spending on Cybersecurity Ranks If They Were Small Countries

Last week, our team predicted the biggest cybersecurity trends in the new year – specifically, that as attacks grow in complexity and sophistication, breaches will be the new normal.Indicative of the...

View Article


Moving Beyond the Encryption Debate

With the Cybersecurity Information Sharing Act snuck into the omnibus budget bill in December, and the horrific terrorist attacks in Paris and San Bernardino, encryption has returned front and center...

View Article

Distilling the Key Aspects of Yesterday’s Threat Assessment, Budget Proposal,...

In light of the latest breach– including 200GB of PII of Department of Justice and FBI personnel – yesterday’s news from DC is all the more compelling. As is often the case, the most intriguing aspects...

View Article


Image may be NSFW.
Clik here to view.

Welcome to the Jungle: RSA 2016

 RSA is just a few weeks away, and everyone is finalizing his or her dance cards. There are multiple opportunities to meet the Endgame team, and talk about everything from the Endgame Hunt Cycle to...

View Article

Image may be NSFW.
Clik here to view.

Employing Latent Semantic Analysis to Detect Malicious Command Line Behavior

Detecting anomalous behavior remains one of security’s most impactful data science challenges. Most approaches rely on signature-based techniques, which are reactionary in nature and fail to predict...

View Article

Endgame Tech Talks @ RSA: Adding Substance to Form

Last week, Endgame’s malware researchers and data scientists provided a welcome break from the the chaos of the convention floor at RSA. Our four talks addressed the need for a multi-stage approach to...

View Article
Browsing all 698 articles
Browse latest View live