Diving Into Buhtrap Banking Trojan Activity

Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported in March of 2016 by Group-IB [http://www.group-ib.com/brochures/gib-buhtrap-report.pdf]. Cyphort’s insightful article analyzes the compromise chain from the website eurolab[.]ua, directing users via an apparently injected HTML script src attribute to rozhlas[.]site which served exploit code for […]

Diving Into Buhtrap Banking Trojan Activity

Cyphort recently published an article about the Buhtrap banking trojan [https://www.cyphort.com/banking-malware-buhtrap-caught-action/], targeting users of Russian and Ukrainian banks as reported in March of 2016 by Group-IB [http://www.group-ib.com/brochures/gib-buhtrap-report.pdf]. Cyphort’s insightful article analyzes the compromise chain from the website eurolab[.]ua, directing users via an apparently injected HTML […]

FireEye’s iSIGHT threat intelligence exposes security blind spots

What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field. The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum. To read this article in full or to leave a comment, please click here

FireEye’s iSIGHT threat intelligence exposes security blind spots

What separates a great Major League Baseball hitter like David Ortiz from some run-of-the mill player? Great eyesight and intelligence. Ortiz sees more than others and takes all of the rich information he sees to make an intelligent, actionable decision to swing a baseball or not. While lots of players claim to do this, only a few have the right combination of the two to separate themselves from the field. The same thing can be said for IT security. It takes visibility across the entire attack spectrum, plus analytics and real-world insight, to provide actionable threat intelligence. Many vendors claim to have threat intelligence, but they operate by looking for anomalies in the network to flag something that might be a breach. This can be valuable, but it addresses only part of the security continuum. To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017, return in 2018 as SIM Connect Live

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live. This year's event attracted just under 800 CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.This year's event attracted hundreds of CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

CIO confab SIMposium to skip 2017

The Society for Information Management has announced that is reworking its annual SIMposium conference, which took place last month in Connecticut, and will come back in the spring of 2018 with an event dubbed SIM Connect Live.This year's event attracted hundreds of CIOs and other IT decision makers and business strategists to exchange thoughts on everything from leadership to risk management to the workforce of the future (See also: "CIO Security Lessons -- Dark thinking on IoT & exploding enterprise networks").To read this article in full or to leave a comment, please click here

In tech recruiting, playing it safe is risky business

The Silicon Valley version of the American Dream goes something like this: a dishwasher, a bike messenger, an actor, a waiter (insert totally-unrelated-to-technology job title here) leverages his or her hobbyist-level coding skills to land a hot programming job and becomes a "rockstar developer."And nearly everyone who works in tech, from CEOs, venture capitalists, startup founders, and programmers themselves will tell you they don't care what a candidate's background is; where they went to school; what gender, race, ethnicity they are. All that matters is their tech chops and whether they can do the job. That's terrific, in the hypothetical.In practice, however, is where this dream breaks down; the HR professionals, hiring managers and tech recruiters who are on the front lines of hiring do care about those qualifications, to the detriment of both candidates and companies, says Harj Taggar, co-founder and CEO of technical hiring platform Triplebyte.To read this article in full or to leave a comment, please click here

RIP AirPort? Apple may abandon wireless routers and Time Capsule

Apple is reportedly done with routers.While the company hasn’t said anything publicly, Bloomberg’s Mark Gurman (who has an excellent track record with Apple rumors) reports that Apple’s wireless router division has been disbanded. The engineers who were working on products like the AirPort Express, AirPort Extreme, and AirPort Time Capsule have been moved to work on other projects over the past year, according to Gurman.To read this article in full or to leave a comment, please click here

RIP AirPort? Apple may abandon wireless routers and Time Capsule

Apple is reportedly done with routers.While the company hasn’t said anything publicly, Bloomberg’s Mark Gurman (who has an excellent track record with Apple rumors) reports that Apple’s wireless router division has been disbanded. The engineers who were working on products like the AirPort Express, AirPort Extreme, and AirPort Time Capsule have been moved to work on other projects over the past year, according to Gurman.To read this article in full or to leave a comment, please click here

46% off Foval 150PSI Car Digital Tire Pressure Air Gauge – Deal Alert

This tire pressure guage from Fovsal features a lighted nozzle and display screen for ultimate visibility in low light, and doubles as a vehicle emergency tool with LED flashlight, car window breaker, seat belt cutter, and red safety light.  It averages 4.5 out of 5 stars on Amazon, where its typical list price of $20 has been reduced 46% to just $10.87. See it now on Amazon.To read this article in full or to leave a comment, please click here

USB Consoling Myself With Opengear’s ACM7004-5

Have you ever tried using the USB Console port on your network hardware? Me neither, and that’s mainly because the instructions typically begin with Download and install the USB console driver for your operating system, at which point I exhale deeply and get out my USB serial adapter instead. I think Opengear must have heard me sighing because the ACM7004-5 Remote Site Gateway device they’ve sent me to look at has four USB console ports built in.

Opengear ACM7004-5 Front

Opengear ACM7004-5

The compact ACM7004-5 packs more power than its diminutive stature might at first suggest. Taking a look at the back panel reveals a densely-packed set of ports offering a total of four switched GigabitEthernet ports, four serial console ports (RJ-45) and four USB ports:

og7004-back

As with the other small Opengear devices I’ve tested, this model comes with a single rackmount bracket so it can be attached within a rack with relative ease. It’s only about five inches wide, so it’s not too hard to find a free space to locate it. If you aren’t blessed with a rack, there are small rubber feet that can be stuck on the underside. The power port is interesting; I find myself shouting for Continue reading

PowerNSX: PowerShell cmdlets to automate NSX

Looking to automate NSX for vSphere? Unsure where to start? Look no further than PowerNSX.

NSX, PowerShell, PowerNSX

PowerNSX is a PowerShell module that abstracts the VMware NSX for vSphere API to a set of easily used PowerShell functions. It aims to focus on exposing New, Update, Remove and Get operations for all key NSX functions as well as adding additional functionality to extend the capabilities of NSX for vSphere management beyond the native UI or API.

PowerNSX works closely with VMware PowerCLI, and PowerCLI users will feel quickly at home using PowerNSX. Together these tools provide a comprehensive command line environment to manage your VMware NSX for vSphere environments.

PowerNSX continues to be updated and feature requests are welcome via the issues tracker on the projects GitHub page. Remember that VMware does not support this module, and PowerNSX comes with no warranties express or implied. Please test and validate PowerNSXs functionality before using in a production environment.

What’s in the box?

So what does your free download of PowerNSX give you?

At a glance:

  • Over 210 cmdlets providing CRUD operations for a majority of NSX for vSphere’s capability. This command-line environment (programmatic language) allows for projects and applications of all sizes!