About Ted Gruenloh

This author has not yet filled in any details.
So far Ted Gruenloh has created 7 blog entries.

Booo! Don’t Let FUD Scare You

What better time than Halloween to discuss the marketing strategy of Fear, Uncertainty, and Doubt - better known in our industry as FUD? First, I want to concentrate on the F in FUD... The Fear. Uncertainty and Doubt are interesting, but in the business of Network Security, use of Fear is more common and more problematic. So what does the use of Fear in marketing look like? It's not always obvious, but any language that scares you in to [...]

By | 2017-10-31T16:26:58+00:00 October 31st, 2017|Business Development, Network Security|Comments Off on Booo! Don’t Let FUD Scare You

An Update on BadRabbit

Please see our notes below on BadRabbit, the latest ransomware threat. First things first. We have several measures in place to detect and stop network communications related to BadRabbit. To see if your Sentinel has detected BadRabbit-related traffic, search your Event Activity page for the term, 'BadRabbit'. Stay up to date. That said, analysis of this ransomware is evolving quickly, and it's important to stay on top of the story. One of the best resources we've found is Cisco's Talos blog: [...]

By | 2017-10-31T16:27:22+00:00 October 26th, 2017|Network Security|Comments Off on An Update on BadRabbit

Inbound Exploits Are Still A Thing

In a year chock full of juicy network security headlines, two of the biggest so far have been WannaCry and the Equifax breach. Here’s a quick refresher: WannaCry broke out in May (fizzling shortly thereafter), taking advantage of a known vulnerability in the SMB protocol and utilizing an exploit attributed to a group linked to the NSA (the Equation Group) via tools posted by a different group with ties to Russia (the Shadow Brokers). So much intrigue … You [...]

By | 2017-10-27T00:36:14+00:00 October 16th, 2017|Network Security|Comments Off on Inbound Exploits Are Still A Thing

The CINS Army List Is Changing Today

Since 2012 (before Threat Intelligence was cool) we've published a public list of malicious IP addresses for the community. It goes by many names: CINS Army, CI Army, CINS ... In any case, over 10,000 users (these days those 'users' are automated tools, scripts, and open source projects) now download the list regularly, for use in their firewalls, IPSes, SEIMs, and other network security tools. And today, the list is getting a bit of a facelift. Up until today, [...]

By | 2017-10-27T00:34:36+00:00 September 26th, 2017|Network Security|Comments Off on The CINS Army List Is Changing Today

Apache Struts Vulnerabilities Are Nothing New

With news breaking on the use of an Apache Struts vulnerability in the recent Equifax breach, we thought we'd shed some light on Struts exploits from our perspective. First and foremost: Our customers should know that no Sentinel appliances or servers within the Sentinel infrastructure are affected by these vulnerabilities. And, more importantly, our customers' networks have been protected against these Struts exploits since they were made public. Struts vulnerabilities are nothing new - we've been witnessing Struts-related exploits [...]

By | 2017-10-27T00:38:37+00:00 September 14th, 2017|Network Security|Comments Off on Apache Struts Vulnerabilities Are Nothing New

WannaCry Ransomware Attacks Over Mother’s Day Weekend

By now, I’m sure you’re aware of the WannaCry ransomware strain (also known as WanaCrypt0r and Wcry), which broke out over this past weekend. It is currently distributed via a Windows operating system vulnerability in the SMB protocol, and has infected networks in 150 countries worldwide. A lot has happened in a short amount of time, so we want to make sure you have the most current information and a better understanding of how to protect your network. Here [...]

By | 2017-10-31T13:25:14+00:00 May 15th, 2017|Network Security|Comments Off on WannaCry Ransomware Attacks Over Mother’s Day Weekend

Infographic: Security Mindsets to Adopt Today

In today’s world, the landscape of network security is constantly evolving. High profile security breaches and vulnerabilities (think Ashley Madison, Target, and Heartbleed) have prompted increased awareness of cybersecurity, spurring on the continued advancement of emerging technologies. But even the creation of updated devices and highly technical tools hasn’t stopped new breaches from happening. The reality is that if a cybercriminal is determined to get into your network, steal data or disrupt performance, one tool isn’t going to stop them. [...]

By | 2017-10-31T16:50:36+00:00 September 15th, 2015|Uncategorized|Comments Off on Infographic: Security Mindsets to Adopt Today