Uber Hack and Cover-up, Featuring David Kennedy-MSNBC

November 27, 2017 | By:

Former NSA hacker David Kennedy speaks about the implications of the Uber hack and whether the company should have reported the data breach. Click Here: Uber Hack and Cover-Up, Featuring David Kennedy-MSNBC


Held for Ransom! Learn How to Protect Your Data.

November 21, 2017 | By:

 Great panel with Chris Prewitt of TrustedSec, Federal Bureau of Investigation (FBI), Ulmer & Berne LLP, Wells Fargo Insurance Services, and RT Specialty  discussing “Cyber Game Plan: A Tabletop Exercise in Defending a Ransomware Attack.” Video Link: Held for Ransom! Learn how to Protect Your Data. Powerpoint: Held for Ransom! Learn How to Protect Your Data.  …


Full Disclosure: Authenticated Command Execution Vulnerability in pfSense <= 2.3.1_1 (pfSense-SA-16_08.webgui)

November 17, 2017 | By:

On 05/19/2016 Scott White of TrustedSec discovered an authenticated command injection vulnerability in pfSense. It was responsibly disclosed to pfSense (security@pfsense.org) on 06/08/2016 and promptly fixed by the pfSense development team. TrustedSec wants to thank the pfSense team for the impressive response time and for providing a great open source project. Although the vulnerability was…


Character Assassination: Fun and Games with Unicode

November 14, 2017 | By:

Why this subject? I love Unicode, and I even adopted a character (I’ll let you guess which one). Lots of research has been done on Unicode security issues, but not many people talk about it. Unicode was created to provide an expandable character set to encompass more languages than the standard Latin alphabet can express….


TrevorC2 – Legitimate Covert C2 over Browser Emulation

October 27, 2017 | By:

TrustedSec is proud to announce the release of the TrevorC2 HTTP(s) command and control (C2) open source framework. TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are different and does not use POST requests for data exfiltration. There are two components…


After Las Vegas shooting, Nevada officials go after sham websites seeking donations – Fox News, Featuring Alex Hamerstone

October 12, 2017 | By:

The Nevada Attorney General’s office is investigating reports of fake online charities collecting donations on behalf of victims that were killed or wounded at a shooting at a country music festival in Las Vegas Oct. 1. Officials are partnering with GoFundMe and other social media sites to take down these fraudulent pages. There has been…



Anyone who uses Social Security Numbers for security is crazy… – Yahoo Finance, Featuring Alex Hamerstone

October 03, 2017 | By:

The Equifax hack that compromised 143 million Social Security numbers didn’t just destroy the country’s trust in credit bureaus; it also most certainly killed the use of SSNs for security and identity authentication. The nine-digit SSN has been used for this purpose for years. Typically, the last six digits of a SSN are used because…


A Different Take on Exam Prep: CISSP

September 29, 2017 | By:

I just passed the CISSP examination. I saw what many did to prepare for their exam, and I did something else. I needed something faster to arrive at passing results. First off, the CISSP is “Certified Information Systems Security Professional”. It is an advanced credential requiring not just a passing exam score, but also dedicated…


Full Disclosure: JitBit Helpdesk Authentication Bypass 0-Day

September 29, 2017 | By:

Summary An authentication bypass issue was discovered in JitBit Help Desk Software v8.9.11 in October of 2016. This issue was reported to the vendor, and after several communications and numerous updated releases, the software is still vulnerable. JitBit Help Desk Software is a popular ticketing system which boasts some well-known clients. Details It is possible…