

Economic Catalysts in Malware Development
This was actually written in October of 2010, in response to getting a continuous stream of the same questions after cleaning malware off...


Someone asked me 'Why'
Someone asked the question, "Why are you on LinkedIn?" (and the SecurityPanda is indeed on LinkedIn). This is what came to mind. That's a...


"Hacking" Is Not A Dirty Word - A Brief Treatise on the Origins of IT Creativity
This is something I authored back in 2010, but it is even more pertinent today. It does need updating, and I may very well do that here...


Bridging the Air Gap - Exploring the USBee Attack
Q [aka Quartermaster] must have come up with this … It really does sound like something from a James Bond scenario – A standard USB...


Cyber Threat Intelligence - Where do you get yours?
Recently I did some work on a new Cyber Threat Intelligence project. The Cyber Threat Intelligence aggregation and analysis trend has...


NTP Vulnerabilities: What happens when your best friend turns on you?
Ah, the heartbreak! That ever-reliable best friend quietly running on port 123 and keeping us all in sync. We know it, use and love it…...

























