Hackers: You Can’t Beat Them, But You Can Sure Make Their Lives Difficult

This is one of the main ideas I came away with after attending the Mandiant/FireEye webinar yesterday. The webinar, “From the Front lines: What really happened at MIRcon” (Mandiant Incidence Response Conference) summarized some of the main talks from that conference. Mandiant was acquired by FireEye in January and, together, they are recognized as one … Continue reading Hackers: You Can’t Beat Them, But You Can Sure Make Their Lives Difficult

Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

In the latest Mandiant webinar, consultants Chris Oetting and Mike Middleton explained the difficulty of restoring an organization’s network after it has suffered a serious cyber attack. About 30% of recent cyber attacks that Mandiant has responded to involve organizations that have been compromised by attackers employing backdoors. These are programs installed surreptitiously on a … Continue reading Mandiant Webinar Highlights the Difficulty of Dealing with the Latest Varieties of Cyber Attacks

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, at a later time, to achieve financial gain, but its motivation is somewhat different than … Continue reading Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks