threat resistance unit

threat resistance unit

Aug 162018

Cyber Black Market: What You Wouldn’t Think a Hacker Wants

| Senior Threat Intel Analyst

It is not difficult to understand the value of stolen bank accounts, credit cards, and social security numbers to cybercriminals. Each of those items are pieces of the average person’s financial life, and the fact that they can easily translate to profits in the hands of sellers on the cyber black market should come as […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 102018

Credit Card Skimming: Big Business for Data Thieves on the Dark Web

| Senior Threat Intel Analyst

What if I told you that for as little as $10, I could use your credit card without your knowledge or permission? Thanks to the Dark Web, I can. From track data dumps to cloned cards, the buyers and sellers on Dark Web forums are in the market for credit card information, and there are […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 32018

Stolen PII & Ramifications: Identity Theft and Fraud on the Dark Web

| Senior Threat Intel Analyst

When the U.S. Department of Justice announced the seizure of AlphaBay last year, they closed a criminal marketplace on the Dark Web known to have trafficked in everything from illegal drugs to malware over the course of two years. At the time of the takedown, AlphaBay was home to more than 350,000 listings, many of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Mar 272018

Cybercrime-as-a-Service: Selling DDoS on the Dark Web

| Senior Threat Intel Analyst

Unlike legitimate cybersecurity jobs, cybercrime does not require certification or advanced degrees. In fact, the barrier of entry into the world of cybercrime remains extremely low, in large part due to the growth of cybercrime-as-a-service on the Dark Web. In The Black Market Report, our Threat Resistance Unit (TRU) researchers identified a full menu of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Events

Mar 222018

WEBINAR | Inside the Cyber Underworld: Armor’s Black Market Report

admin Image

admin

Apr 112017

Sound the Alarms – Hacker Owns Dallas’ Emergency Management Systems

In the early morning hours approximately 156 outdoor weather/emergency sirens wailed horns across Dallas neighborhoods, thanks to a culprit who possibly gained physical access to a centralized broadcast system or, via remote access through phone lines sending signals to individual siren towers. Ordinarily used to alert residence to dangerous weather activity, the horn blasts cast […]

Mar 142017

Data Classification and You: How to Improve Organizational Efficiencies and Security

| Head of the Threat Resistance Unit

In the era of big data and analytics, organizations are inundated with information, from business critical intellectual property, to routine employee memos. The diversity of this data makes effective management and classification essential to avoid being overwhelmed under a mountain of ones and zeroes. Data classification is a system of identifying and tagging data so […]

Troy Dearing

Head of the Threat Resistance Unit

Troy Dearing is the Head of the Threat Resistance Unit and oversees all cyber threat intelligence & threat hunting initiatives. He initially joined Armor’s TRU as a Senior Ethical Hacker leveraging 22 years of expertise in IT and cyber security.

Before joining Armor, Troy was a Computer Network Operator for the NSA, where he was tasked with performing Computer Network Exploitation operations. He retired from the Marine Corps after 20 years of service with distinction serving as a network intelligence subject matter expert, instrumental in the creation of a service level course on network exploitation and analysis. Early in his career he was selected for an internship at the NSA’s Red Team which established his foundation in cyber security expertise. He graduated magna cum laude from the University of Maryland University College attaining his Bachelor of Science in Cybersecurity. Troy is a Certified Information Systems Security Professional (CISSP).

Mar 12017

Armor Analysis – Cloudbleed: Lessons learned

About two weeks ago, the Google Project Zero team found a buffer overflow problem with a Cloudflare product that helps its customers protect against content scraping programs that pulls copyrighted material to aggregators. According to published reports, a line of code should have had an “=<” instead of an “==.” While seemingly innocuous, this single […]

Apr 202016

Pen Testing: Embracing Proactive Cyber Security

Penetration testing — or pen testing as it’s commonly called — is the act of seeking out weakness in a given IT environment. Many organizations include penetration testing as part of their annual audit(s), but often miss out on its true value. Why is it so important? Armor CSO Jeff Schilling explains.

Apr 212014

Who Broke the Heartbleed Bug?

| Head of Threat Resistance

On April 8, one of the most pernicious bugs to ever strike the Internet made the news — the Heartbleed Bug. A vulnerability in the ubiquitous OpenSSL library, it can be used to obtain login user names, passwords, credit card information, application source code, and encryption keys – anything that may exist in server memory. […]

Chris Hinkley, OSCP, CISSP

Head of Threat Resistance

As Head of Threat Resistance at Armor, Chris Hinkley utilizes a decade of security expertise to design, test and deploy next generation security processes and techniques for the cloud. His work at Armor was instrumental in Armor being one of the first cloud companies globally to achieve PCI DSS compliance. Prior to Armor, Hinkley worked as a Web Developer for TargetScope, an interactive marketing and Web development company. In that role he created everything from website animations to complex and dynamic product configurations using the latest technology and development frameworks. With Armor, Hinkley has held a number of security and technology-related roles, including security engineer, lead engineer, support manager and lead ethical hacker. In those roles he has serviced thousands of FireHost customer servers, including Windows and Linux, and overseen the security of all hosting environments to meet PCI, HIPAA and other compliance guidelines. Hinkley is a sought after speaker and author on cloud, security and open source topics, publishing regular columns in SecurityWeek and other industry magazines. Hinkley is a Certified Information Systems Security Professional (CISSP).