The Coalfire Labs Blog

Welcome to the Coalfire Labs Blog, a resource covering the most important issues in IT security and compliance.  The Coalfire Labs blog is written by the company's leadership team and our highly-credentialed security assessment experts.


  • IT Security Horror Story: Is your Network an Unsegmented Haunted House?

    October 29, 2014, Mark Manousogianis, Information Security Consultant, Coalfire Labs

    One day I went to a client site to perform internal penetration test to emulate the insider threat. This testing was designed to help this client understand the damage a rogue employee or an intruder who gained physical access to the network could do.  The site that I was visiting was a storefront and had public WiFi.  I told the store staff who I was there to meet, and while I waited for the client to become available I connected to the public WiFi just to have a look.

  • IT Security Horror Story: Digging your own grave with Default Credentials

    October 29, 2014, Mark Manousogianis, Information Security Consultant, Coalfire Labs

    I recently performed a penetration test that really required no “hacking skills” whatsoever. I was able to obtain domain administrator rights simply by logging into web applications and network hardware using default credentials.

  • IT Security Horror Story: Slow Network, Big Phish

    October 29, 2014, Mark Manousogianis, Information Security Consultant, Coalfire Labs

    It was a typical morning, just like any other for Annie. She arrived at the office just in time to fill her coffee mug and get to her desk to read her email that had been piling up since Friday. After reading through the standard office wide emails she came across one from the help desk.

  • BYOD Survey Results: Employees are not playing it safe with company data

    August 14, 2012, Mike Weber, Vice President, Coalfire Labs

    Employers are seeing a drastic increase in the number of employees using personal smartphones and tablets in the office. This “Bring Your Own Device” (BYOD) trend is causing headaches for the IT department and there is no stopping this trend. Due to the sensitive nature of company information often accessed on those devices, it has become a growing concern for small and large businesses alike.

  • Phishing Season: Spam on the rise

    September 01, 2011, Mike Weber, Vice President, Coalfire Labs

    Within the past two weeks there have been several reports on the increase in email spam, which can be directly correlated to an increase in phishing schemes and malware attacks.  These attacks are frequently being delivered under the guise of legitimate business: they come in the form of shipment confirmations, credit card statements, and IRS alerts.  They all request swift action to click a link or to read an attachment to address some pressing issue.

Top