malware protection

malware protection

Oct 232018

Diving Deeper: Malware

| Head of Incident Response and Forensics

In 1971, Creeper, perhaps the earliest documented occurrence of malware, was created in an experiment designed to test how a program might move between computers. Fast forward to 2018, and the seeds planted in that experiment decades ago have grown into something far more dangerous – countless malware variants infecting personal and enterprise networks, raking […]

Kevin Dickinson

Head of Incident Response and Forensics

Kevin Dickinson is the Head of Armor's Incident Response and Forensics division and brings 10 years of experience in computer forensics and security to the organization. His team works closely together with Armor's Threat Resistance Unit (TRU) and Indications and Warnings (I&W) teams to stay abreast of the rapidly evolving threat landscape and provide resolution on a wide-range of security issues. Kevin demonstrates a strong understanding of attacker techniques and methodologies, providing a uniquely qualified perspective in identifying and investigating potential security incidents and minimizing threat actors. Kevin is a GIAC Certified Incident Handler (GCIH) and Offensive Security Certified Professional (OSCP).

Jul 122018

#TBT: Cyber Threats that Won’t Go Away

| Senior Ethical Hacker

Our last blog dove into a brief – and perhaps shockingly long – history of cyber threats. We were able to look at how cybercriminals have evolved their tactics throughout the years, as well as how cybercrime has proliferated and resulted in the cybersecurity industry of today. As a follow up, and because old habits […]

Geoffrey Pamerleau

Senior Ethical Hacker

Geoffrey Pamerleau joined Armor as a senior ethical hacker bringing 10 years of expertise in IT and cyber security to the Threat Resistance Unit (TRU). Before joining Armor, Geoff was a Computer Network Operator for the NSA, where he was tasked with performing computer network exploitation operations. He served in the United States Air Force with distinction as a Cyberspace Operations Officer. Prior to his commission, Geoff received a Bachelor’s in Computer Science with a focus on Cyberwarfare from the United States Air Force Academy. While there, Geoff was a member of the Academy’s Cyber Warfare Club and competed in National and International information security competitions. Geoff has certifications in incident handling and penetration testing from SANS and Offensive Security. (GCIH, GPEN, and OSCP).

Jun 282018

Mid-Year Cybersecurity Threat Update

| Senior Threat Intel Analyst

The cybersecurity underground is not stagnant. Attackers are continuously innovating to find new ways to make money and exploit any weaknesses available.   When we released the Black Market Report in March, the Armor Threat Resistance Unit (TRU) research team  revealed the varying costs of personal data in the underground, as well as the thriving market for cybercrime-as-a-service. Throughout the first half of 2018  though, other trends have emerged. Most notably, the increasing interest […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

May 12018

The Anatomy of a Cybersecurity Attack

| Head of the Threat Resistance Unit

As technology becomes more sophisticated, so do hackers and the tools they use to get their hands on sensitive data. In the past several years, we’ve seen a rise in cybersecurity attacks and data breaches as cybercriminals successfully infiltrate companies using everything in their toolkits from malware and ransomware to social engineering tactics. Why you […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Oct 252017

Ransomware Alert: Bad Rabbit

The latest news and prevention techniques for Bad Rabbit. Armor’s security experts are monitoring this malware as it spreads globally to ensure you can protect you and your customers’ sensitive data.

Aug 92017

Using a ‘defense in depth’ strategy to thwart ransomware attacks

| Senior Ethical Hacker

Several recent ransomware and malware attacks have highlighted the unintended consequences that have resulted from information dumps published by the illusive group known as The Shadow Brokers. Multiple other actors have since taken the capabilities that were leaked and successfully used them to penetrate systems and compromise data. Among their recent high-profile events were the […]

Geoffrey Pamerleau

Senior Ethical Hacker

Geoffrey Pamerleau joined Armor as a senior ethical hacker bringing 10 years of expertise in IT and cyber security to the Threat Resistance Unit (TRU). Before joining Armor, Geoff was a Computer Network Operator for the NSA, where he was tasked with performing computer network exploitation operations. He served in the United States Air Force with distinction as a Cyberspace Operations Officer. Prior to his commission, Geoff received a Bachelor’s in Computer Science with a focus on Cyberwarfare from the United States Air Force Academy. While there, Geoff was a member of the Academy’s Cyber Warfare Club and competed in National and International information security competitions. Geoff has certifications in incident handling and penetration testing from SANS and Offensive Security. (GCIH, GPEN, and OSCP).

Jul 262017

Rebooting Your Patch Management Process

| Head of Security

The first half of 2017 was rough for cyber security. Multiple waves of major cyber attack campaigns like WannaCry and Petya have left everyone paranoid and constantly looking over their shoulder for the next shoe to drop. Even with this high level of paranoia, have companies started taking the necessary proactive steps for threat prevention? […]

Wayne Reynolds

Head of Security

Head of Security, Wayne Reynolds, manages the cyber and physical security operations at Armor. This unique, dual responsibility extends beyond the typical approach many cloud providers take in securing their own operations while leaving customers to fend for themselves. Key to establishing the strategic and operational vision at Armor, Wayne oversees the execution of Security Incident Management, Security Infrastructure, Vulnerability Threat Management, Threat Intelligence, Corporate Security, and Physical Security within both Armor’s corporate and customer environments. He leads Armor's Friendly Network Forces, a one-of-a-kind internal penetration testing organization designed to validate the company’s own security measures and evaluate risk from new or unforeseen threats. Prior to Armor, Wayne served in the U.S. Marine Corps for nearly 20 years where he led the Tactical Information Technology and Avionics Departments. In his civilian career, he has led organizations for a wide range of businesses including Conde Nast Publication, Copart Auto Auctions, Aerojet-Rocketdyne, Citi Group, and GameStop.

May 172017

Dissecting WannaCry – Understanding the Past to Anticipate the Future

| Lead Ethical Hacker

With the initial wave of WannaCry subsiding, it’s important to dissect what transpired in anticipation of the next possible emergence. We know that The Shadow Brokers released what were supposedly an arsenal of nation-state hacking tools last month. Two of which are the engines behind WannaCry targeting exclusively Windows machines. The WannaCry ransomware/worm has a […]

Chris Hinkley, OSCP, CISSP

Lead Ethical Hacker

As Lead Ethical Hacker at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer and support manager. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).

May 152017

WannaCry: The Definitive Litmus Test For Taking Security Seriously

Cyber insurance providers are always looking for that litmus test on how to judge if an organization seeking insurance is serious about their security program. I am going to say it bluntly — if an organization had significant business impact due to the WannaCry Ransomware operation, they were negligent in conducting security operations. This Microsoft […]

May 112017

The Evolution of Mirai – What the Future Could Hold

When Mirai was unleashed a little over six months ago targeting security journalist Brian Krebs’ site with an unprecedented denial of service attack (DDoS) attack that reached 620 Gbps, everyone asked, “What will happen next?” We at Armor stated there would be an initial lull in the record-breaking DDoS activity that would coincide with an […]