Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

Black Hat 2015 Analysis: An Island in the Desert

Cyber LegislationNational Security This year’s Black Hat broke records yet again with the highest levels of attendance, including highest number of countries represented and, based on the size of the...

View Article


Image may be NSFW.
Clik here to view.

NLP for Security: Malicious Language Processing

Data Science Natural Language Processing (NLP) is a diverse field in computer science dedicated to automatically parsing and processing human language. NLP has been used to perform authorship...

View Article


Image may be NSFW.
Clik here to view.

Hunting for Honeypot Attackers: A Data Scientist’s Adventure

Data ScienceMalware This year’s Pwnie Award goes to ... OPM! The U.S. Office of Personnel Management (known as OPM) won the “Most Epic Fail” award at the 2015 Black Hat Conference for the worst known...

View Article

Three Questions: Smart Sanctions and The Economics of Cyber Deterrence

National Security The concept of deterrence consistently fails to travel well to the cyber realm. One (among the many) reasons is that, although nuclear deterrence is achieved through nuclear means,...

View Article

A Keynesian Approach to Information Freedom

National Security A free and open Internet is the cornerstone of net neutrality, advocated by civil liberties groups and the US government alike. A wide range of actors have taken this concept to the...

View Article


Image may be NSFW.
Clik here to view.

Meet Endgame at AWS re:Invent 2015

  See how we automate the hunt for cyber adversaries.Stop by Booth #1329 to:See a Demo of Endgame ProductsSign up here for a private demo to learn how we detect attacks that: Use native tools to...

View Article

Image may be NSFW.
Clik here to view.

MinHash vs. Bitwise Set Hashing: Jaccard Similarity Showdown

Data Science As demonstrated in an earlier post, establishing relationships (between files, executable behaviors, or network packets, for example) is a key objective of researchers when automating the...

View Article

Webinar: Automating the Hunt for Network Intruders

  As adversaries - whether criminal or otherwise - make use of increasingly sophisticated attack methods, network defenses have not kept pace; they remain focused on signature-based, reactive measures...

View Article


Empty Promises, Broken Memes: Why Skepticism Should Prevail When It Comes to...

National Security Last week’s understanding reached between Chinese President Xi Jinping and US President Barack Obama highlighted the attempt to mitigate the growing tension between the countries over...

View Article


Image may be NSFW.
Clik here to view.

To Patch or Not to Patch? The Story of a Malicious Update

Vulnerability Research While it’s unlikely that Shakespeare had patching in mind when he penned “to be or not to be”, I started thinking about this seemingly simple question the other day when I heard...

View Article

Image may be NSFW.
Clik here to view.

The State of the State: Tech & Data Science

Data Science  A few years ago Jeff Hammerbacher famously claimed  that, “The best minds of my generation are thinking about how to make people click ads.” This seems to have only marginally changed...

View Article

Image may be NSFW.
Clik here to view.

Adobe Flash Vulnerability CVE-2015-7663 and Mitigating Exploits

Vulnerability Research  Today Adobe released a patch for CVE-2015-7663[1] that addresses a vulnerability we discovered in Flash Player. The vulnerability exists due to the improper tracking of freed...

View Article

Beyond Privacy: Trans-Pacific Partnership & Its Potential Impact on the Cyber...

Cyber AlliancesCyber Legislation For months, there has been sharp criticism of the secret negotiations surrounding the Trans-Pacific Partnership (TPP), which is on track to becoming the world’s largest...

View Article


May the Source Be With You: 4 Implications of China’s Latest Stance on the...

National Security According to the Chinese state-run Xinhua news, the OPM breach, “turned out to be a criminal case rather than a state-sponsored cyber attack as the U.S. previously suspected.”...

View Article

Image may be NSFW.
Clik here to view.

Why Banning Tor Won’t Solve France’s National Security Problem

Cyber IntelligenceCyber LegislationBy Andrew Morris and Andrea Little Limbago Throughout the second half of this year, there has been much heated debate about proposed changes to the Wassenaar...

View Article


Image may be NSFW.
Clik here to view.

Jamie Butler Cigital Podcast: On Security Research, Thinking Like a Hacker,...

Data ScienceBy: Margot KoehlerToday, Gary McGraw of Cigital spoke with our CTO Jamie Butler about Endgame's security research, thinking like an adversary, and his specialization in rootkit development....

View Article

A New Year, A New Normal: Our Top Cybersecurity Predictions for 2016

Cyber Intelligence Each of the last several years has been dubbed the “year of the breach,” or more creatively the “year of the mega-breach.” But instead of continuing this trend and calling 2016 the...

View Article


Image may be NSFW.
Clik here to view.

How Banks' Spending on Cybersecurity Ranks If They Were Small Countries

Image: Maddie King Last week, our team predicted the biggest cybersecurity trends in the new year – specifically, that as attacks grow in complexity and sophistication, breaches will be the new...

View Article

Endgame Crushes the Industry Average for Gender Diversity

Women in TechnologyIn the State of the Union address on Tuesday, President Obama highlighted the important contributions of women in science and technology fields. Unfortunately, the tech industry on...

View Article

Image may be NSFW.
Clik here to view.

Endgame Participates in Tough Mudder Benefitting Wounded Warrior Project

On April 20, over thirty Endgame employees, family members and friends participated in the Mid-Atlantic Spring 2013 Tough Mudder, supporting the Wounded Warrior Project. Funds raised for the Wounded...

View Article
Browsing all 698 articles
Browse latest View live