Blog

Blogs by: Chuck McAuley
Chuck
Principal Security Engineer
  • View:
  • 9 |
  • 18 |
  • 36
  • per page
Chuck
June 20, 2019 | By Chuck McAuley
A Next Generation Firewall (NGFW) is a device that incorporates both the features of a traditional firewall along with the capabilities of advanced threat detection and filtering. While most vendors will have their own spin on what makes them great, you can define them based on a common set of…
June 20, 2019 | By Chuck McAuley
A Next Generation Firewall (NGFW) is a device that incorporates both the features of a traditional firewall along with the capabilities of advanced threat detection and filtering. While most vendors will have their own spin on what makes them great, you can define them based on a common set of…
8 min read #Security
Chuck
April 19, 2019 | By Chuck McAuley
Port scanning is the one of the oldest mechanisms used in network security scanning, service assessment, and discovery. However, just because it's old doesn't mean its utility has diminished. Port scanning takes advantage of a network protocol's handshake as a service discovery mechanism. Port…
April 19, 2019 | By Chuck McAuley
Port scanning is the one of the oldest mechanisms used in network security scanning, service assessment, and discovery. However, just because it's old doesn't mean its utility has diminished. Port scanning takes advantage of a network protocol's handshake as a service discovery mechanism. Port…
5 min read
Chuck
October 12, 2018 | By Chuck McAuley
Having worked in cyber security for my entire career, I've been asked by many, mostly younger, people, how to enter into this space and make a positive contribution. This normally produces a long winded, meandering, poorly defined answer from myself, attempting to touch on all the parts of my…
October 12, 2018 | By Chuck McAuley
Having worked in cyber security for my entire career, I've been asked by many, mostly younger, people, how to enter into this space and make a positive contribution. This normally produces a long winded, meandering, poorly defined answer from myself, attempting to touch on all the parts of my…
6 min read
Chuck
January 10, 2018 | By Chuck McAuley
We've introduced a change to the BreakingPoint platform in our new December 8.40 release, which is now available for download on the Ixia support site. It's a small change that impacts a large part of our established user base, so we wanted to point it out as soon as we announced the release. In…
January 10, 2018 | By Chuck McAuley
We've introduced a change to the BreakingPoint platform in our new December 8.40 release, which is now available for download on the Ixia support site. It's a small change that impacts a large part of our established user base, so we wanted to point it out as soon as we announced the release. In…
6 min read #ATI #Security
Chuck
August 29, 2017 | By Chuck McAuley
A very common practice between malware researchers is to encrypt viruses with common passwords. This enables researchers at different locations to share samples while avoiding antivirus engines cleaning out or modifying the sample in transit. It's a simple, quick effective hack. And now we've added…
August 29, 2017 | By Chuck McAuley
A very common practice between malware researchers is to encrypt viruses with common passwords. This enables researchers at different locations to share samples while avoiding antivirus engines cleaning out or modifying the sample in transit. It's a simple, quick effective hack. And now we've added…
3 min read #Security #ATI
Chuck
August 17, 2017 | By Chuck McAuley
Since DEFCON 25 and BsidesLV are in the books for 2017, I thought I'd reflect on some of the talks I attended and provide my views about them. I tried to stay on task with job-relevant talks, but even I can’t not go see Kasparov. Bsides Las Vegas GO Forth and Reverse - Tim Strazzere Tim gave a…
August 17, 2017 | By Chuck McAuley
Since DEFCON 25 and BsidesLV are in the books for 2017, I thought I'd reflect on some of the talks I attended and provide my views about them. I tried to stay on task with job-relevant talks, but even I can’t not go see Kasparov. Bsides Las Vegas GO Forth and Reverse - Tim Strazzere Tim gave a…
9 min read #ATI #Security
Chuck
April 7, 2017 | By Chuck McAuley
A few weeks ago, we discussed the new Apache Struts vulnerability and how it was exploited in the wild. Since then, these drive-by style attacks haven't let up, but the intent has changed. Initially, we saw scans fingerprinting vulnerable servers. Soon after, we started seeing attempts to drop…
April 7, 2017 | By Chuck McAuley
A few weeks ago, we discussed the new Apache Struts vulnerability and how it was exploited in the wild. Since then, these drive-by style attacks haven't let up, but the intent has changed. Initially, we saw scans fingerprinting vulnerable servers. Soon after, we started seeing attempts to drop…
5 min read #ATI #Security
Chuck
April 6, 2017 | By Chuck McAuley
While researching this Dahua password disclosure vulnerability, I stumbled on another flaw in the Dahua IP cameras. Combined with the password disclosure, it demonstrates how multiple vulnerabilities can be leveraged together to create a much bigger problem. Such a flaw is not normally that big by…
April 6, 2017 | By Chuck McAuley
While researching this Dahua password disclosure vulnerability, I stumbled on another flaw in the Dahua IP cameras. Combined with the password disclosure, it demonstrates how multiple vulnerabilities can be leveraged together to create a much bigger problem. Such a flaw is not normally that big by…
5 min read #ATI #Security