Software

REVERSE(noitcejnI LQS dnilB) Bank Hacking

By |2020-03-31T10:34:57-04:00May 16th, 2010|

Earlier this year we were hired to perform an Overt Web Application Penetration Test for one of our banking customers (did you click that?).This customer is a reoccurring customer and so we know that they have Web Application Firewalls and Network Intrusion Prevention Systems in play.We [...]

Comments Off on REVERSE(noitcejnI LQS dnilB) Bank Hacking

Conficker C and friends – Defeating worms with architecture

By |2020-03-31T10:39:34-04:00March 31st, 2009|

The first line of technical defense against any computer intrusion is the architecture of the network infrastructure that the computer is connected to. The fact that worms like Conficker are so successful in their metastasis is "in your face" proof of just how insecure today's IT Infrastructures are. [...]

Comments Off on Conficker C and friends – Defeating worms with architecture

Cambium Group, LLC. CAMAS Advisory

By |2020-03-31T10:39:42-04:00February 24th, 2009|

We've finally released the Cambium Group, LLC Content Management System ("CAMAS") advisory after much waiting and debate. These security risks were discovered in CAMAS during a customer penetration test that we did in August of 2007 (we notified the Cambium Group about these risks on 08/24/2007). [...]

Comments Off on Cambium Group, LLC. CAMAS Advisory