contact us

The Art and Science of Predicting Weaponization

The Art and Science of Predicting Weaponization As threats have become more sophisticated and have increasingly turned to more adaptive and continuous approaches to security such as Gartner’s Adaptive Security Architecture. This model breaks...

Koadic: New Features and Video Demonstration

Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic does most of its operations using Windows Script Host...

read more

Questions for Executives on Cyber

By Ed Amoroso, Founder and CEO of TAG Cyber During my career, it’s been my honor to have served alongside some of the most capable and talented corporate executives in the world. One such executive, Andy Geisse, now serves as Operating Partner...

read more

Watch Those Robots

Are you worried about security for robots? I am. I worked with welding robots many, many years ago. They were not networked, and they ran on proprietary embedded systems and code. Twenty-five years later, I remember being briefed by a...

read more

Spectre Rises from the Grave

On May 21, 2018, Microsoft and Google released two new side-channel attacks called Spectre Variant 3a (CVE-2018-3640) and Variant 4 (CVE-2018-3639). These are only important to worry about if you are an operating system developer; for everyone...

read more

States Can Do More to Protect Elections

Last month, Congress authorized $380 million in federal funding for states to improve the administration of elections and enhance election security. The Election Assistance Commission (EAC) is now distributing the funds. While the EAC did not...

read more
Prioritize Your Remediation Across a Growing Attack Surface