Home

Welcome to your new site.

Welcome to your new site! You can edit this page by clicking on the Edit link. For more information about customizing your site check out http://learn.wordpress.com/

Latest from the Blog

Beware the WiFi Mule: A New APT Tactic

Although the term WiFi Mule is currently not part of the NIST glossary of terms, it is a technique that security teams should be aware of. During a cyber incursion, Incident Response teams will follow a standard set of playbooks: wipe computer systems, disable accounts & reset passwords, block malicious IPs and close firewall holes…

Nirig99: North Korea’s IoT & OT Hackers

A new North Korean APT, Nirig99 has been responsible for turning industrial and IoT networks into its playground. From smart payment devices to factory controllers, the group exploits poorly secured systems for both financial gain and espionage. This threat actor takes its name from the mythological creature Girin, which is Nirig backwards. It is suspected that the…

Firepower Access Control Policy not blocking VPN connections

So, you have discovered in your authentication logs that an ip range explicitly blocked, denied by default or even geo-blocked is somehow still attempting to gain VPN access? Since VPN traffic is going to the FTD and not through the FTD, it is handled by the control-plane rather than the data-plane. Fortunately, a solution is…

Get new content delivered directly to your inbox.