analysis

October 20, 2015

THREAT RESEARCH

Dangerous Clipboard: Analysis of the MS15-072 Patch

This post was authored by Marcin Noga with contributions from Jaeson Schultz. Have you ever thought about how security researchers take a patch that has been released, and then reverse it to find the underlying security issue? Well, back In July Microsoft released security bulletin MS15-072, titled:…

September 30, 2015

NETWORKING

Connected Analytics: Learn to Live on the Edge – and Love It!

Not surprisingly, as a networking company Cisco frequently publishes predictions on the growth of Internet traffic. Bragging unintended, typically the forecasts are pretty accurate. In a 2012 report we predicted that by 2017 there would be 2.5 devices and related connections for every person on eart…

June 2, 2014

SECURITY

Attack Analysis with a Fast Graph

This post is co-authored by Martin Lee, Armin Pelkmann, and Preetham Raghunanda. Cyber security analysts tend to redundantly perform the same attack queries with different input data. Unfortunately, the search for useful meta-data correlation across proprietary and open source data sets may be labor…

May 19, 2014

SECURITY

Angling for Silverlight Exploits

This post is co-authored by Andrew Tsonchev, Jaeson Schultz, Alex Chiu, Seth Hanford, Craig Williams, Steven Poulson, and Joel Esler. Special thanks to co-author Brandon Stultz for the exploit reverse engineering.  Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners a…

Big Data in Retailing: Follow the Money!

Retailers looking at the Big Data opportunity may well find themselves with an array of choices: the opportunities seem so vast, where does one begin? Well, a pragmatic way forward is to focus on some pragmatic possibilities and then “follow the money”! In examining the Big Data opportunity for reta…