Contact Sales

NEWS

news-header.jpg

Cost of Cybersecurity: The Disaster That is a Long-Term Breach

Jeff Peters of HackSurfer reports on the Cost of Cybersecurity: The Disaster That is a Long-Term Breach. Sean Bodmer, chief researcher at CounterTack says
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
“Their biggest concern is the dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points,” said Sean Bodmer, chief researcher, counter-exploit intelligence at CounterTack. “That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about.” - See more at: http://hacksurfer.com/amplifications/99#sthash.KcGE3LEh.dpuf
the "biggest concern is dwell time, detecting the threat soon enough before it has time to propagate across the network, establish more of a beachhead, additional resilient points. That period of catching the threat soon enough before it has time to dwell, that is one of the biggest things they all talk about."

SCADA Security: No One Wants to Start a War, But They Could

HackSurfer logo"Instead of fixing all their software problems, they're just trying to layer in security in the middle," said Sean Bodmer, chief researcher at CounterTack, in this article by Jeff Peters on HackSurfer: SCADA Security: No One Wants to Start a War, But They Could. Bodmer continues, "Some of these programs and some of these turbines are still running on Windows 98 believe it or not. I saw one a year and a half ago out in Washington state. The cost of these SCADA companies, energy companies, to actually turn off those turbines and do the software upgrade from Windows 98, in 2012 – the last year that I saw it – it costs them so much money they’d rather just wait until it crashes before actually stopping the turbine. It costs millions of dollars to stop and clean and get back going and the load balancing.”

Carberp Source Code Leak Likely To Spawn Malware Variants, Innovation

In Brian Prince's coverage of the Carberp source code leak on Dark Reading, Carberp Source Code Leak Likely To Spawn Malware Variants, Innovation, CounterTack Chief Researcher Sean Bodmer weighs in. Bodmer says "not only was the Carberp code revealed in that .rar, there was also a large amount of Russian banking application code for the BSS thick client, likely exfiltrated from that organization directly. Additionally, there are many other source compilations from bootkit techniques to anti-AV modules, which quickly become a security researcher's goldmine."

Experts Weigh In: Cybersecurity trends 2-3 years down the road?

Jeff Peters asks several security experts "what stands out when you think of cybersecurity 2-3 years down the road?" in this article on HackSurfer: Experts Weigh In: Cybersecurity trends 2-3 years down the road?CounterTack Chief Researcher Sean Bodmer says
“I believe Wi-Fi and wireless in and of itself is going to be one of the biggest problems that we’re going to have to deal with, especially if the FCC implements [it's plan to relieve crowed Wi-Fi networks] across the nation. It’s going to open up so no matter where you are your device can be reached, you can be tracked, and we already have the problems now with cellular tracking. That was a big thing at DEFCON and Black Hat a couple years ago. Well, when they open up all of these phones to Wi-Fi and everyone is walking around with an IP address and driving around with an IP address or jogging around with an IP address, there are a whole bunch of privacy and security concerns.” - See more at: http://hacksurfer.com/amplifications/69#sthash.RP5bOFaY.dpuf
"
“I believe Wi-Fi and wireless in and of itself is going to be one of the biggest problems that we’re going to have to deal with, especially if the FCC implements [it's plan to relieve crowed Wi-Fi networks] across the nation. It’s going to open up so no matter where you are your device can be reached, you can be tracked, and we already have the problems now with cellular tracking. That was a big thing at DEFCON and Black Hat a couple years ago. Well, when they open up all of these phones to Wi-Fi and everyone is walking around with an IP address and driving around with an IP address or jogging around with an IP address, there are a whole bunch of privacy and security concerns.” - See more at: http://hacksurfer.com/amplifications/69#sthash.RP5bOFaY.dpuf
“I believe Wi-Fi and wireless in and of itself is going to be one of the biggest problems that we’re going to have to deal with, especially if the FCC implements [it's plan to relieve crowed Wi-Fi networks] across the nation. It’s going to open up so no matter where you are your device can be reached, you can be tracked, and we already have the problems now with cellular tracking. That was a big thing at DEFCON and Black Hat a couple years ago. Well, when they open up all of these phones to Wi-Fi and everyone is walking around with an IP address and driving around with an IP address or jogging around with an IP address, there are a whole bunch of privacy and security concerns.” - See more at: http://hacksurfer.com/amplifications/69#sthash.RP5bOFaY.dpuf
I believe Wi-Fi and wireless in and of itself is going to be one of the biggest problems that we're going to have to deal with, especially if the FCC implements [its plan to relieve crowed Wi-Fi networks] across the nation. It's going to open up so no matter where you are your device can be reached, you can be tracked, and we already have the problems now with cellular tracking. That was a big thing at DEFCON and Black Hat a couple years ago. Well, when they open up all of these phones to Wi-Fi and everyone is walking around with an IP address and driving around with an IP address and jogging around with an IP address, there are a whole bunch of privacy and security concerns."

Pesky Bug Drags Facebook Shadow Profiles Into the Spotlight

In Richard Adhikari's coverage of Facebook shadow profiles in TechNewsWorld, Pesky Bug Drags Facebook Shadow Profiles Into the Spotlight, CounterTack Chief Researcher Sean Bodmer offers his expert insight. Finding secret shadow files among the data that seem to be analyzed and correlated data points of every user ranging from their real-life details to private information input by members "is shocking, although not surprising," Bodmer says.

Facebook Security Glitch Exposes Millions of Users' Data

Chief Researcher for CounterTack, Sean Bodmer, provides commentary in Jennifer LeClaire's article in Newsfactor, Facebook Security Glitch Exposes Millions of Users' Data, on the recent Facebook security glitch exposing millions of users' data.

CIO Today: Google Reports Iranian Phishing on Eve of Elections

Google has been reporting on phishing activity out of Iran since 2011. Jennifer LeClaire reports on CIO Today that the latest phishing campaigns are likely tied to the Iranian presidential election. According to Sean Bodmer, chief researcher of CounterTack, “There are always observable traits and effects in every campaign, incident or attack that infer the possible aggressor, and it would appear that political implications and motives may indeed be one of them in this particular case.”

Dark Reading: 12 Endpoint Security Myths Dispelled

Ericka Chickowski reports on Dark Reading: 12 Endpoint Security Myths Dispelled . There are plenty of misapprehensions and delusions about endpoint security receive little attention from security pundits. Sean Bodmer, chief researcher for CounterTack, weighs in on two of them – AV Is Outdated And Useless, and Some Endpoints Aren’t Important Enough To Be Attacked.

Credit Union Times: Threat of the Week: DDoS For Hire on the Rise

Chief Researcher for CounterTack, Sean Bodmer, provides commentary in Robert McGarvey’s story in Credit Union Times, Threat of the Week: DDoS For Hire on the Rise, on the growing business of DDoS for hire and the threat it poses to financial institutions.

Network World: Products of The Week 5.20.13

Network World’s Products of The Week 5.20.13 reviews the launch of CounterTack Scout 4.0. Key Features: A cyber defense solution utilizing Deep System Inspection enables organizations to detect, assess and respond to advanced threat attacks. New Stealth Agent powers active defense solutions, including next-gen honeynets.

For Media Inquiries

Please email press@countertack.com

View News Mentions from Previous Years:

2015 News Mentions

2014 News Mentions

2013 News Mentions