Episode 2.8 – NSA and Exploit Tools, Petya, Russia, and Ransomware, systemd, Deathstar, and Office persistence methods

July 03, 2017 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Ben Tenjamin, Geoff Walton, Chris Prewitt, Justin Bollinger


Episode 2.7 Tavis breaks the Internet, Executive Orders, Diskless Persistence Methods, and more!

May 11, 2017 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Scott White, Geoff Walton, Costa Petros, and Alex Hamerstone.


Episode 2.6 – Special Guest Jayson E. Street, Shadow Brokers, Google OAuth, and more!

May 05, 2017 | By:

Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Scott White, Justin Bollinger, Costa Petros, Ben Ten, Chris Prewitt, Jayson E. Street


Equation Group Dump Analysis and Full RCE on Win7 on MS17-010 with Cobalt Strike

April 15, 2017 | By:

UPDATE: When posting this blog, we had not done the most recent patches for patch Tuesday (in March). This SMB flaw apparently was fixed on Tuesday with MS17-010. When we did our testing, we were out of the patch cycle for March. Clarified the blog post with the update and link to Microsoft below. Link…


A Foundation Built on People – The TrustedSec Family Grows

April 04, 2017 | By:

When I started TrustedSec over five years ago, I had a dream to start a company that makes the security industry better. A company that brings in top talent and amazing people that I call friends. A place where we always work with the mindset of “always doing the right thing” for our people and…


Office 365 – Advanced Threat Protection (ATP): Features and Shortfalls

February 13, 2017 | By:

Office 365 has an assortment of capabilities allowing both small to extremely large businesses to move their infrastructure and services to the cloud. In 2015, Microsoft introduced their “Advanced Threat Protection” functionality and has since been bolstered in 2016 and 2017 as a direct way to protect against advanced attacks. If you look at Microsoft’s…


Circumventing EncodedCommand and IEX Detection in PowerShell

January 25, 2017 | By:

PowerShell continues to be one of the hot topics for security conferences and something that is actively being used both for offense and for defense. Defenders are getting smarter when it comes to detecting potentially malicious uses of PowerShell through a number of methods. There’s a number of methods that are used for legitimate and…


TrustedSec Security Podcast Ep: 2.5 – Mirai, Rudy Cyber head, ransomware, Invoke-Obfuscation and more!

January 20, 2017 | By:

Episode 2.5 – Krebs on Mirai, Rudy Cyber head, ransomware, and more! Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Justin Elze, Geoff Walton, Scott White, Paul Burkeland, Ben Ten, Alex Hamerstone, and Sarah…


TrustedSec Security Podcast Episode 2.4 – New Years Special with Milton Security

December 29, 2016 | By:

Episode 2.4 – Law Firm Hacks, Voting Systems and Russia Hacking, 5 signs to better security, Wire, CobaltStrike and more! Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Justin Elze, Geoff Walton, Adrian Crenshaw,…


Wire Messenger – A new competitor to Signal and more?

December 24, 2016 | By:

It’s still too soon to tell, but do we finally have an alternative to Signal? I see a lot of folks asking about Wire Messenger. A lot of the same questions and I thought I would help on answering some of these questions. #1 Why is everyone switching and why should I when we have…