Quizzes used for data collection

All over the Internet, there are quizzes that promise to reveal specific details about an individual by having them answer a handful of questions. A wide variety of online quizzes and surveys exist, some claim to be able to determine what kind of animal a person would be by determining what they were like in […]

Iranian Cyber Threat – Action Plan

In light of the killing of General Soleimani, there has been rampant speculation about what responses Iran might take and whether those would include cyberattacks. While we can’t know for sure what Iran will do, we assess with moderate confidence that: Iran will operate as a rational actor Iran benefits from avoiding a kinetic escalation […]

OSINT Issues

To start off researching the website ziprecrulter.cx, I submitted the domain to VirusTotal to see if anyone else had reported suspicious activity from it. So far this seems to be a good place to start, this domain has been previously reported so it’s not a new threat to users, however, an intriguing factor was the […]

iPhone Hacking and Indiscriminate Targeting

Yesterday, Google Project Zero announced that they discovered a campaign exploiting a wide range of iPhone models and iOS versions in the wild. Google shared details about the exploits and the malware, but little about the campaign itself. This may be to protect business interests or it may be to stop a panic of those […]

Twas the night before infosec Christmas – 2018 Edition

Twas the night before Christmas and all over the ‘net, Not a creature was stirring except China hacking Tibet. The IPS were strung by the egress with care,  In hopes that St WannaCry soon would be stopped there. The children were nestled all snug in their beds, While IoT devices mined the dreams from their […]

Equifax Report Demonstrates Why Culture Matters

According to the Congressional report on Equifax, a root cause of the breach was that Equifax moved the IT security team out from under IT due to “fundamental disagreements.” Although this is highlighted as a shortcoming in the report, in my opinion, this is misguided.  In the vast majority of organizations, infosec shouldn’t be under […]

Facebook Breach Webcast

Today Rendition Infosec presented a webcast on the Facebook API breach. We covered what we know and what we don’t about the breach up to this point. Note: the audio has a few issues. I apologize for some audio problems we had due to a user interface issue with our webcast provider. We’ve fixed it […]

It’s 10pm, do you know where your API keys are?

Yesterday, the social media archival service Timehop announced that they had suffered a breach. The service allows users to look back through their social media feeds to see what was happening last year for instance. In order to facilitate this, Timehop stores API keys for users’ social media accounts. Timehop did a great job disabling […]

ICE Subpoenas Information About Infosec Researcher

Yesterday, Zack Whittaker from ZDNet published a story about ICE attempting to gain information about a Twitter user who publishes information about data left exposed on the Internet. This is likely about export control regulations, but even if so, it is precedent setting. In this post, I share some thoughts on how this may change […]

Infosec Advent Challenge #14 posted – Linux syslog analysis

We’ve posted the 14th challenge in the “Infosec Advent” series. This one is a Linux server intrusion case. You get syslog and auth.log. Unfortunately that’s all that was being forwarded. We have some Linux syslog and authentication logs download here. Download and analyze the logs for signs of intrusion. Based on the log data, let us […]

Your cart
subtotal:
$0.00

This will be copy area - something to the effect of estimated ship time if applicable

CONFIDENTIAL

Rendition's advanced courses contain the latest in information security knowledge. Please contact us for more information.

This page has proprietary information in it, please contact us for more information.