Archives

Home » Archives by: Mike Spohn

Hunting for DoublePulsar in your networks

June 13th, 2017 (No Comments)
The recent release of the Equation Group’s (NSA) FuzzBunch software by the Shadow Brokers has caused quite a stir in the security community. The volume of files released, (6,547 in one of the dumps), is an extraordinary collection of malicious…

Analyzing a Spear Phishing Email

April 12th, 2017 (No Comments)
About every week or so I receive one of those obvious Phishing Emails telling me a package was not deliverable or some such foolishness. After being very careful not to click on the attachment, I typically permanently delete these Emails.…

Incident Response Strategy – Establish a Perimeter via Network Visibility

December 20th, 2016 (No Comments)

As a seasoned incident response practitioner, I am always looking for better ways to manage serious security breaches. Over the last decade, the cyber-security community has refined many strategies and best-practices to help organizations identify, investigate, contain, and remediate advanced

© 2017 PacketSled, Inc.