Profile

Cover photo
ANTHONY M. FREED
Works at Norse Corporation
792 followers|183,927 views
AboutPostsPhotosYouTube+1's

Stream

ANTHONY M. FREED

Shared publicly  - 
 
0000 Security researcher Anthony Joe Melgarejo reports that point-of-sale (PoS) systems are being targeted with a reconnaissance Trojan (TROJ_RECOLOAD.A) which is being delivered by way of the fileless installation functionality of the Angler Exploit Kit. “Fileless installation involves installing the malware into locations that are difficult to scan or detect,” Melgarejo wrote. “The malware exists only in memory and is written directly to RAM in...
2
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
01203 In everyday business, a complex set of external relationships is commonplace. Services, infrastructure, and even software live in the cloud, supplied by third-parties. An organization’s value is often in the data it generates, but how secure is that data across your digital supply chain? Do your external vendors and partners adhere to your security standards? How do you know for sure? They may have …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 A leading security researcher is raising serious concerns about the stability of the Internet following the disclosure of a now patched critical vulnerability in BIND9 (CVE-2015-5477), the oldest and most widely deployed software used by domain name servers for translating common domain names into specific IP addresses. The vulnerability could allow an attacker to crash large portions of the Web with simple to craft malformed packets …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
41304 There has been an identified need to share Cyber Intelligence. The history of the discussion dates back a number of years and the actual timeline is out of the scope of this study. However, it is important to understand that the need for sharing this type of information is so that it ultimately becomes actionable and applied. It is not difficult for an individual to …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 A portion of the Department of Defence’s nonclassified email network used by Army General Martin Dempsey and other members of the U.S. military’s Joint Staff has been shuttered after “suspicious activity” was detected on the systems over the weekend. “We continue to identify and mitigate cybersecurity risks across our networks,” Lieutenant Colonel Valerie Henderson said. “With those goals in mind, we have taken the …
2
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
1616129 People much smarter than me once said, “great defense requires understanding the enemy.” And man, that sounds wise as hell! That’s like long bearded dude on a mountaintop type of wise. And so we run with that and turn it into a training class, just like someone turned the profound wisdom of “there’s plenty more fish in the sea” into a fishing class. But …
2
Add a comment...
Have him in circles
792 people
Brian Pennington's profile photo
Sean Bodmer's profile photo
Ken Webster's profile photo
Lawrence P's profile photo
mary anne Barlan's profile photo
Nancy Sammy's profile photo
Kandy Zabka's profile photo
Ryan B's profile photo
João Carvalho's profile photo

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Internet Crime Complaint Center (IC3), a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C), has issued an advisory regarding a widespread distributed denial of service (DDoS) extortion campaign targeting U.S. companies. IC3 says it has received an growing number of complaints from businesses reporting they have been the target of emails which threaten a DDoS attack against the...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Following a definitively negative response from an array of stakeholders during a public comment period, the U.S. Department of Commerce has decided to rewrite aspects of a proposal for expanding regulatory control over the export of hacking instruments like malware and zero-day exploits. The original proposal would have made newly added listings in the 2013 amendments for controlled items in the Wassenaar Arrangement (WA) part of U.S. law. ...
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Army General Frank J. Grass, National Guard Bureau Chief and member of the Joint Chiefs of Staff, announced plans to form the National Guard Cyber Protection Team, which will establish a cyber defense capability in each of the ten multi-state Federal Emergency Management Agency (FEMA) regions. The long term goal will be to have the Guard establish cyber capabilities across the nation where key industries and universities can partner to suppo...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 In the wake of substantial data breaches at the Office of Personal Management (OPM), the IRS, and the State Department, a new survey reveals that the majority of U.S. citizens believe the government should take action against foreign nations believed to have beeen involved in an attack. The study, conducted by Vormetric and Wakefield, found that fully 92% of respondents feel the government should initiate some …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 The Department of Homeland Security (DHS) announced they will transition governance of the STIX , TAXII and CybOX automated threat information sharing specifications to an international open standards process through the Organization for the Advancement of Structured Information Standards (OASIS). TAXI (Trusted Automated eXchange of Indicator Information) was designed to define the standard set of services and information exchange mechanisms...
3
3
David Ford (FirefighterBlu3)'s profile photoMichael Olsen's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 German security researcher Benjamin Kunz Meyri, the founder of Vulnerability Lab, has disclosed a critical zero-day vulnerability in the Apple iTunes and AppStore platforms which allows the hijacking of shopping sessions to acquire applications, music, or movies while fraudulently charging the purchase to a targeted account holder. The Filter Bypass and Persistent Invoice Vulnerability allows a remote attacker to inject malicious script into...
1
Add a comment...
People
Have him in circles
792 people
Brian Pennington's profile photo
Sean Bodmer's profile photo
Ken Webster's profile photo
Lawrence P's profile photo
mary anne Barlan's profile photo
Nancy Sammy's profile photo
Kandy Zabka's profile photo
Ryan B's profile photo
João Carvalho's profile photo
Work
Employment
  • Norse Corporation
    Senior Editor of Publications, 2014 - present
  • Tripwire, Inc.
    Community Engagement & Social Media Coordinator, 2014
  • Freelance Security Writer
    2008 - 2013
  • Infosec Island
    Managing Editor, 2010 - 2012
Links
Contributor to
Story
Tagline
Check out Norse Corp - live machine readable attack and threat intelligence...
Introduction

Anthony M. Freed is the Director of Publications for Norse Corporation, and is also the Communications Advisor for the Cyber Security Forum Initiative, which provides Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners

Norse is the leading innovator of live dark intelligence and adaptive security solutions that enable the proactive defense, rapid detection, risk-based response, and faster resolution of advanced cyberattacks. Norse's live dark intelligence platform continuously analyzes high-risk network traffic from the global Internet's darknets and the deep web, to proactively identify the sources, characteristics, and risk-levels of cyberattacks. Learn more at www.norse-corp.com or follow us @NorseCorp on Twitter.

Anthony is an infosec journalist who authored numerous feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets, including The New York Times, Reuters, The Register, Financial Times of London, MSNBC, Fox News, PC/IT/Computer/Tech World, eWeek, SC Magazine, CSO Magazine, Federal News Radio, The Herald-Tribune, Naked Security, and many more. 

Anthony previously wrote about the finance industry before moving into the information security field, and received notoriety as a financial freelance journalist, including having numerous articles published by leading media syndicates such as The Chicago Sun-Times, Business Week’s Business Exchange, Seeking Alpha, InvestorCentric, OpenSalon, Bear Market Investments, Alacra Pulse, ML-Implode, and dozens more.

Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

Basic Information
Gender
Male
ANTHONY M. FREED's +1's are the things they like, agree with, or want to recommend.
Let Me Tell You Some Akamai Security Stories - The Akamai Blog
blogs.akamai.com

I'm a journalist by trade, with two decades of newspaper reporting and editing behind me. I've spent the last decade writing about informati

SCM: System Hardening... Made Easy
www.slideshare.net

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: R

nCircle
plus.google.com

nCircle is the leading provider of automated security and compliance auditing solutions

Metricon 8 - This Con Was a Bit Different...
www.tripwire.com

Well, Metricon 8 came and went along with RSA. This con was a bit different - not even a conference, but a working session. Pete Lindstrom (

RSA Conference Attendees Respond: "If I Were a CISO..."
www.tripwire.com

At the RSA Conference, we asked attendees to share with us what they would happen if they became a chief information security officer (CISO)

RSA 2013 Finale: It's Really All About the People
www.tripwire.com

RSAC 2013 has finally come to an end. All in all, if you can look beyond the hype and rampant commercialism that is the trademark of this, t

Techniques to Instill Confidence in Security
www.tripwire.com

Here are two ugly realities about security: Everyone is concerned with their level of security. 100% security is an impossibility. If you ca

What Would You Do If You Became CISO?
www.tripwire.com

It’s good to be the king…or is it? The Chief Information Security Officer or CISO is a position to strive for, avoid, and run away from if y

Security BSidesSF Goes Above and Beyond
www.tripwire.com

For those of you who were lucky enough to be at Security BSides San Francisco 2013, you already know what we know - the event went off witho

RSA Conference
plus.google.com

#rsac, #security, #cybersecurity, #bigdata, #networking

The Convergence of DevOps and Security
www.tripwire.com

Next week is the big RSA Conference in the US (San Francisco), and I'm really looking forward to leading a panel discussion on "Making Rugge

Security Visualization: AfterGlow Cloud
www.tripwire.com

One of the leading thinkers in the realm of security visualization is Raffael Marty, he literally wrote the book on the topic.“Applied Secur

20 Critical Security Controls: Control 4 - Continuous Vulnerability Asse...
www.tripwire.com

Today's post is all about Control 4 of the CSIS 20 Critical Security Controls - Continuous Vulnerability Assessment and Remediation (the las

Beyond the PCI Checkbox. Customer Success Story.
www.tripwire.com

We have many customers who originally have bought Tripwire to comply with a PCI audit. However, we have found that when our Professional Ser

U.S. to friend and foe: Come visit our network flea market!
blogs.csoonline.com

Is it sad that a lot of us find humor and indifference in just how easy it is to rummage through the government's computer networks? Per

Announcement from Infosec Island Members: TakeDownCon: Special Discounts...
www.linkedin.com

Special Training Promotion for Infosec Island Members Sign up for any of the trainings, and enjoy the following: 1. 15

Infosec Island - Apps on Android Market
market.android.com

Infosec Island is the premier resource for all IT and Information Security-related news, articles and commentary. Join the largest IT Securi

First documented case of cyber espionage? - Forbes
www.forbes.com

There have been so many examples of cyber espionage that it is now the norm to just accept that it is rampant.  MI5 in the UK, the German Ch