Upcoming Podcast: Python security projects
April 28, 2015, Mike Weber, Vice President, Coalfire Labs
Join Coalfire penetration tester Dan McInerney on Thursday April 30th at 6:00pm ET on the Security Weekly Podcast. Read more
Social Engineering- Beyond the Baseline
December 15, 2014, Brandon Edmunds, Senior Security Consultant, Coalfire Labs
Coalfire Labs does a lot of Social Engineering testing. Traditional Social Engineering testing involves a mundane process of taking a sample of a population and then attacking those “targets” with some pretext calls or a phishing email in order to obtain credentials. Metrics are recorded and then reported back in some form of a deliverable, usually a report. As an example, in a standard Social Engineering engagement, we had a Pretext Calling campaign that included a target selection of 10 users. We made 10 phone calls and talked three of the targeted people out of their passwords.
Law Firm - Forensics Services
December 11, 2014, Jennifer Velnoskey, Regional Sales Director
As cyber threats and attacks have increased year over year, Coalfire has seen a drastic increased need for support to law firms in cybersecurity cases. Attacks and threats vary so often, many law firms lack the skills required to properly evaluate cyber-attacks involving their clients. As such law firms across the nation are looking to partner with skilled cybersecurity companies to provide expert testimony, litigation consulting, and support related to cases involving cyber-attacks.
Truth is SCARIER than Fiction Redux
October 30, 2014, Mike Weber, Vice President, Coalfire Labs
Yes... To be honest, although we really do some neat stuff here at Coalfire Labs that can be pretty scary, I’ve got to give a shout out to “reality” for being even scarier than any emulated attack we could possibly develop. The astounding number of data breaches announced this year is just shocking, really. It really felt like there was a new one every month. As it turns out, there was! Even more than that on average, as we’ve had at least 14 of them over a 10 month span.
IT Security Horror Story: Is your Network an Unsegmented Haunted House?
October 29, 2014, Mark Manousogianis, Information Security Consultant, Coalfire Labs
One day I went to a client site to perform internal penetration test to emulate the insider threat. This testing was designed to help this client understand the damage a rogue employee or an intruder who gained physical access to the network could do. The site that I was visiting was a storefront and had public WiFi. I told the store staff who I was there to meet, and while I waited for the client to become available I connected to the public WiFi just to have a look.