Blog Posts Tagged with "Target"

0356a83ecb15c8e33b00560d7bebe47f

CFO’s Don’t Want to Get it When it Comes to Risk and Security…Until it’s Too Late.

February 06, 2014 Added by:Stephen Marchewitz

According to Ponemon estimates (PDF), the breach will cost Target over $2 Billion dollars. Will Target's CFO get fired? He probably couldn’t spell security before the incident, but had to testify before congress about what they’re going to do…talk about your crash courses.

Comments  (1)

C9f10ffa24531c96d85e0445499fd1e4

Target and Neiman Marcus Breaches Renew Issues Regarding PCI Lawsuits

January 16, 2014 Added by:john melvin

We have no way of knowing right now what the causes of the recent Target and Neiman-Marcus data breaches are. It just raises the same questions of: does compliance with PCI standards mean that everything is secure against attacks? If an application is compliant, is that enough? It doesn’t seem to be clear whether or not a company can completely “pass the buck” to the developers and maintaine...

Comments  (0)

D8853ae281be8cfdfa18ab73608e8c3f

Who's Logged In? A Quick Way to Pick Your Targets

October 04, 2011 Added by:Rob Fuller

Say you need to get your bearings quickly on an internal test and going into each shell and doing a PS, then looking through the list for all the users logged in is a definitely not ideal. I wrote a quick script that you can throw in the Meterpreter scripts folder to aide you a bit with this...

Comments  (0)

924ce315203c17e05d9e04b59648a942

Creating an Effective Cyber Espionage Operation

March 15, 2011 Added by:Richard Stiennon

The tools and methods include the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning. But getting actionable intelligence into the right hands is the hardest task. This post proposes one such operational structure...

Comments  (0)