Intelligence

Episode 6: Global panel, AI & innovation

Our global retail panel discusses how AI, in particular, is taking an increasingly large role within the context of retail IT innovation and within regional markets.

June 30, 2014

SECURITY

Threat Spotlight: A String of ‘Paerls’, Part One

This post was co-authored by Jaeson Schultz, Joel Esler, and Richard Harman.  Update 7-8-14: Part 2 can be found here This is part one in a two-part series due to the sheer amount of data we found on this threat and threat actor. This particular attack was a combined spearphishing and exploit attempt. As we’ve seen in the past, this […]

CMX Takes the Stage at DevNet Hackathon at #CLUS 2014

Earlier this week you learned about the network at Cisco Live! If you attended the event this year, you'll also have noticed that there was a brand new extension...

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be laborious and time consuming with relational databases as multiple tables are joined, […]

May 19, 2014

SECURITY

Angling for Silverlight Exploits

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  httpv://www.youtube.com/watch?v=Yrc0U3pjVZM Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we […]

December 13, 2013

SECURITY

Big Data in Security – Part V: Anti-Phishing in the Cloud

In the last chapter of our five part Big Data in Security series, expert Data Scientists Brennan Evans and Mahdi Namazifar join me to discuss their work on a cloud anti-phishing solution. Phishing is a well-known historical threat. Essentially, it’s social engineering via email and it continues to be effective and potent. What is TRAC currently doing […]