Arbor Threat Intelligence

Arbor's Security Engineering & Response Team (ASERT) Blog
image description

The Enemy Within

Amidst the daily headlines heralding the rise of massive zombie armies and malevolent teenage hackers in far-off countries, it’s easy to lose sight of one of the biggest threats to your network. And you may be surprised by this oft overlooked enemy to uptime and […]

Read more

Some Q1 ’06 Phishing Stats

This morning, on one of the malicious activity tracking lists that we subscribe to, someone asked about phishing stats for Q1 2006. I got curious, too, so I ran stats on the feed going into our Active Threat Feed (ATF) phishing policy, and came up […]

Read more

Inflammatory Accusations

I recently wandered into Ann Arbor’s (and the first ever) Borders Books & Music store where I came upon a magazine titled “Skeptical Inquirer – The Magazine for Science and Reason.” At the bottom of the magazine cover, I read the text “Published by the […]

Read more

Vulnerability Complexities

Dave Goldsmith had a great post earlier today which I would like to point out to anyone who hasn’t read it yet. With comments like, “I’m quite positive that when this vulnerability reached Sun Microsystems, someone’s head exploded”, I found his commentary very amusing. Even […]

Read more

Botnet Tracking, Minute by Minute

We’ve been tracking botnets for some time now; it’s a great way to directly monitor malicious activity. The graph above relates to a botnet I’m currently tracking. It’s seeing a lot of churn – something on the order of thousands of new IP addresses every […]

Read more

Security Product Corewars: When Robots Attack

Q: What do you get when you cross PROTOS, Metasploit, SPIKE, tcpreplay, and ISIC, and then hardware-accelerate it? A: A slew of recently-launched “security analyzer” products — boxes designed to break just about anything on the network (including other security devices) by being the worst, […]

Read more