Information Security and Network Awareness

Hurricane Labs

Subscribe to Hurricane Labs: eMailAlertsEmail Alerts
Get Hurricane Labs: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Hurricane Labs
There are four ways to get data from a host to Icinga. The first is to use an agent, something like NRPE on *nix systems or NSClient++ on Windows based systems. The second way is to pull the data from … Continue reading →
If you are a system administrator or penetration tester, you need to be able to check for common vulnerabilities. When configured incorrectly, SSL/TLS has many. There are tons of SSL auditing tools out there, some with more functionality than others, … Continue reading →
If you are a system administrator or penetration tester, you need to be able to check for common vulnerabilities. When configured incorrectly, SSL/TLS has many. There are tons of SSL auditing tools out there, some with more functionality then others, … Continue reading →The...
You’ve probably seen all the stories recently about the New York Times and Twitter attacks and, basically this was done with an attack on their domain name registrar (Melbourne IT).  There is no real defense against this, aside from locking … Continue reading →
You’ve probably seen all the stories recently about the New York Times and Twitter attacks and basically this was done with an attack on their domain name registrar (Melbourne IT).  There is no real defense against this, aside from locking … Continue reading →The post...
Turning Off Stateful Inspection in Your Check Point Firewall Over the past few years of working with Check Point, I have seem some weird and crazy things. One of those crazy (and unsafe) things I have seen is someone turning … Continue reading →
Malicious DNS Requests Authors: Tom Kopchak and Adam Army Here at the Hurricane Labs RSOC, we track numerous security events across the many networks that our customers trust us to monitor. This gives us valuable insight into the real threats … Continue reading →
Below is a list of suggested commands to be implemented for Cisco Security Switches. These are not meant to secure your network, however, they are meant to help secure your network equipment from the network. Some of these commands may … Continue reading →
Below is a list of suggested commands to be implemented for Cisco Security Switches. These are not meant to secure your network, however, they are meant to help secure your network equipment from the network. Some of these commands may … Continue reading →The post Cisco Sec...
Below is a list of suggested commands to be implemented on your Cisco Security Routers at the global configuration level. These are not meant to secure your network, however, they are meant to help secure your network equipment from the … Continue reading →
Below is a list of suggested commands to be implemented on your Cisco Security Routers at the global configuration level. These are not meant to secure your network, however, they are meant to help secure your network equipment from the … Continue reading →The post Cisco Se...
Top Ten Mistakes We See Clients Make with their Check Point Firewall This list was compiled from our ticketing system and anecdotal evidence taken from our engineering team. This list is by no means exhaustive and not in any order … Continue reading →
Top Ten Mistakes We See Clients Make with their Check Point Firewall This list was compiled from our ticketing system and anecdotal evidence taken from our engineering team. This list is by no means exhaustive and not in any order … Continue reading →The post Top Ten Mistak...
At Hurricane Labs, we are constantly looking for clearer and better ways to effectively convey security concepts and best practices to our customers and the general Internet community as a whole. As part of this security education focused blog, we … Continue reading →
At Hurricane Labs, we are constantly looking for clearer and better ways to effectively convey security concepts and best practices to our customers and the general Internet community as a whole. As part of this security education focused blog, we … Continue reading →The po...
If anyone has been reading the news lately you have probably noticed that some information security focused organizations are pretty bad at actual information security. From the NSA allowing a low level administrator to walk out with sensitive data (and … Continue reading →...
If anyone has been reading the news lately you have probably noticed that some information security focused organizations are pretty bad at actual information security. From the NSA allowing a low level administrator to walk out with sensitive data (and … Continue reading →...
Patch a Vulnerable System Early and Often Consider for a moment what might happen if the airline industry was managed like the security industry.  A pre-flight briefing might sound something like this: “Good morning, this is your captain speaking.  I … Continue reading →The...
Controlling the IIS Source Type As we all know, it is important to keep source types constant in Splunk. However, Splunk has been known to change source types of data from time to time, wreaking havoc on your field extractions. … Continue reading →The post Controlling the I...
Controlling the IIS Source Type As we all know, it is important to keep source types constant in Splunk. However, Splunk has been known to change source types of data from time to time, wreaking havoc on your field extractions. … Continue reading →The post Controlling the I...
Wait… Remind Me Again, What’s Rooting? Rooting is the process of taking existing firmware from a phone and replacing it with a more customized operating system. The main reason people choose to root their device is for the freedom and … Continue reading →The pos...
We specialize in implementing “Splunk for Security.” This could mean getting your firewalls and IDS devices talking to Splunk and making the logs have some meaning or taking in your vulnerability management data and breaking out alerts that tell you … Continue reading →The ...
We specialize in helping implement Splunk for Security. This could mean getting your firewalls and IDS devices talking to Splunk and making the logs have some meaning or taking in your vulnerability management data and breaking out alerts that tell … Continue reading →The p...
Managing Puppet Certificates Puppet uses SSL to communicate from the puppet master to the puppet agents. Using SSL ensures that all communication from the agent to the master is encrypted. This is especially important when you consider the facts are … Continue reading →The ...
Puppet uses SSL to communicate from the puppet master to the puppet agents. Using SSL ensures that all communication from the agent to the master is encrypted. This is especially important when you consider the facts are being transmitted via … Continue reading →The post Ma...
Information security professionals often find themselves filling a critical but unique role within an organization. An effective security approach must balance required business operations and system availability while still ensuring the confidentiality and integrity of these same syst...
When you are hiring a third party web developer you need to consider several things so I’ve attempted to prioritize the things you will want to ask in this list. These are in no particular order of importance. The answers … Continue reading →The post Top Web Application Sec...
Typically, one of the early things a new user on a Unix-like system will encounter is the need to understand the *nix file permissions system. Table of Contents Basic Mechanics of the Unix File Permissions Unix File System – Bit … Continue reading →The post Unix File Permis...
Five Ways to Hire an InfoSec Consultant By: Bill Mathews This is not a nice post. This is not a...Read More
This is not a nice post. This is not a post about posing great interview questions or how to tell if someone can actually do the job. No, this is a post about how to watch out for people you … Continue reading →The post Five Ways to Hire an InfoSec Consultant appeared first...
E-mailing Passwords – Practice What You Preach By: Bill Mathews I have a few pet peeves (okay maybe a lot...Read More
I have a few pet peeves (okay maybe a lot more than a few) but some of them really do have a basis in reality and aren’t just blind rage. This one falls into the “based in reality” category and … Continue reading →The post E-mailing Passwords – Practice What You Preac...
DjangoCMS – Sekizai and Compressor for SASS/SCSS Explained By: Aaron Croyle This deviates from our normal security discussion, but I’m...Read More
This deviates from our normal security discussion, but I’m a developer and this problem has plagued us for a number of days. Turns out the solution is only a few days old, so there’s limited information available out there. Hope … Continue reading →The post Djan...
Medical QR Code Curiosities By: Bill Mathews A few days ago, I had the “pleasure” of checking in to the...Read More
A few days ago, I had the “pleasure” of checking in to the Urgent Care center in my neighborhood hospital. When I was triaged I was issued a nifty little bracelet that had some information printed on it. Nothing major, … Continue reading →The post Medical QR Code Curiositie...
Spot Phishing Attacks Before They Catch You By: Leigh Goldie If something fishy is going on with an email you...Read More
If something fishy is going on with an email you received, you should definitely trust your intuition. Email phishing scams have become an easy way to lure recipients into sharing personal information or clicking on links that install harmful computer … Continue reading →The ...
Who Should Attend This lunch and learn is for information technology professionals and operations personnel who want to understand how...Read More
Hurricane Labs Beacon Podcast Episode Number: .038 – Tom Has Friends Edition Hosts: Bill Mathews (@billford), Ian Gillespie (@ianisgood), Patrick...Read More