Profile

Cover photo
ANTHONY M. FREED
Works at Norse Corporation
790 followers|181,845 views
AboutPostsPhotosYouTube+1's

Stream

ANTHONY M. FREED

Shared publicly  - 
 
0000 The SANS Internet Storm Center is reporting that the Angler exploit kit (EK) serving up Cryptowall 3.0 ransomware has been evolving rapidly by altering its URL patterns on almost daily basis. “The changes accumulate, and you might not recognize current traffic generated by Angler. After two weeks of vacation, I almost didn’t recognize it,” wrote Brad Duncan. “Angler pushes different payloads, but we’re still seeing a lot of CryptoWall 3.0 fr...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Grant Willcox, a U.K. based Ethical Hacking student says that his university’s ethics board requested that he censor some of his research because of concerns about the impact of the disclosure of exploits with regards to restrictions outlined in the Wassenaar Arrangement (WA). “My paper covers three separate exploits that I converted to try bypass EMET 5.1’s protections as best I could and the techniques that I used …
1
1
Bert Knabe's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
2008 The practitioner, the government, industry, and even the public recognize there is significant problem in how we protect the information residing in our networks and infrastructures. We read about it every day in our Twitter feeds or in news events. Bisson, 2015 – Zorz, 2015 – Raywood, 2015 – provide examples from just several weeks. This does not even take into account the fresh …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Malware researcher Kafeine has found that some recent versions of the Kovter trojan will update Adobe Flash with the latest patched version after infecting a device, ostensibly so that no other active exploits can leverage known Flash vulnerabilities to infect the system. The Kovter trojan is employed in click fraud campaigns, where it uses browser processes in an infected device to generate clicks on certain online advertisements which gene...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 According to the Q1 2015 Mobile Malware Report (PDF), 440,267 new strains of malware targeting Android devices were detected in the first quarter of 2015, a 6.4% increase over the Q4 2014. “Mobile banking and online shopping are booming. Fifty percent of U.S. consumers use a smartphone or tablet for their banking transactions, and 78 percent of Internet users make purchases online,” antivirus provider G DATA …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Streaming digital media company Plex has warned users that they should change their passwords immediately after the servers that host the company’s blog and forums were hacked, exposing email addresses and passwords. “Sadly, we became aware this afternoon that the server which hosts our forums and blog was compromised,” the company said in an email to account holders. “We are still investigating, but as far as …
1
Add a comment...
Have him in circles
790 people
Chris Scott's profile photo
Sonny Mikeal's profile photo
khalifa mourad's profile photo
Jeff & Monika Franz-Lien's profile photo
Bert Knabe's profile photo
James McGovern's profile photo
Darin Keuhn's profile photo
Yosyp Korol's profile photo
Pastor James Ochwo's profile photo

ANTHONY M. FREED

Shared publicly  - 
 
0000 Qendrim Dobruna, alleged member of an international cybercrime syndicate, was sentenced to 50 months in prison and ordered to pay $14 million in restitution for participating in the hacking of computer networks of several U.S.-based financial institutions that resulted in millions in losses in a matter of hours. “The adverse impact this individual and other transnational organized criminal groups have on our nation’s financial infrastructure...
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Multiple vulnerabilities have been disclosed in Mozilla’s Firefox browser and Thunderbird email client which could allow an attacker to conduct remote code execution, crash applications, leak sensitive information, or bypass the same-origin policy and other security restrictions. Successful exploitation of these vulnerabilities could result in an attacker gaining the same privileges as the targeted user, and an attacker could install program...
1
2
Bert Knabe's profile photoJim Haner's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 Security researchers have identified a twenty year-old Brazilian student known as Lordfenix as being the mastermind behind a prolific malware development campaign, having created more than one hundred different banking trojans estimated to be valued at over $300 each. “Lordfenix is a 20-year old Computer Science student from Tocantins, Brazil. We were able to trace his activity back to April 2013. At the time, he was operating …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
71503 Today I will lead with an analogy that will hopefully layout the difference between Threat Intelligence and your standard threat feed. There is a huge difference in their value propositions, and my goal is to remove some of the confusion around both. It happens to me all of the time. I am walking down the street and someone thinks they recognize me and calls …
3
1
Jeff Snyder's profile photo
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
0000 A former Georgia-Pacific IT specialist and systems administrator was arrested after his indictment last week by a federal grand jury on charges of intentionally damaging protected computers. The indictment charges that Brian P. Johnson caused more than $5,000 in losses to Georgia-Pacific systems between February 14 and February 27 of 2014. “In an affidavit filed in support of an application for a warrant to search Johnson’s home, FBI …
1
Add a comment...

ANTHONY M. FREED

Shared publicly  - 
 
22908 Making a resurgence among malware writers is steganography, which means to hide in plain sight, according to Dell Security’s Cyber Threats Unit. The Stegoloader malware family, also known as Win32/Gatak.DR (Microsoft) and TSPY_GATAK.GTK (Trend Micro), appears to target healthcare, education, and manufacturing, and it does so with a seemingly innocent Portable Network Graphics (PNG) picture of the Earth in space. Steganography, which combine...
1
Add a comment...
People
Have him in circles
790 people
Chris Scott's profile photo
Sonny Mikeal's profile photo
khalifa mourad's profile photo
Jeff & Monika Franz-Lien's profile photo
Bert Knabe's profile photo
James McGovern's profile photo
Darin Keuhn's profile photo
Yosyp Korol's profile photo
Pastor James Ochwo's profile photo
Work
Employment
  • Norse Corporation
    Senior Editor of Publications, 2014 - present
  • Tripwire, Inc.
    Community Engagement & Social Media Coordinator, 2014
  • Freelance Security Writer
    2008 - 2013
  • Infosec Island
    Managing Editor, 2010 - 2012
Links
Contributor to
Story
Tagline
Check out Norse Corp - live machine readable attack and threat intelligence...
Introduction

Anthony M. Freed is the Director of Publications for Norse Corporation, and is also the Communications Advisor for the Cyber Security Forum Initiative, which provides Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners

Norse is the leading innovator of live dark intelligence and adaptive security solutions that enable the proactive defense, rapid detection, risk-based response, and faster resolution of advanced cyberattacks. Norse's live dark intelligence platform continuously analyzes high-risk network traffic from the global Internet's darknets and the deep web, to proactively identify the sources, characteristics, and risk-levels of cyberattacks. Learn more at www.norse-corp.com or follow us @NorseCorp on Twitter.

Anthony is an infosec journalist who authored numerous feature articles, interviews and investigative reports which have been sourced and cited by dozens of major media outlets, including The New York Times, Reuters, The Register, Financial Times of London, MSNBC, Fox News, PC/IT/Computer/Tech World, eWeek, SC Magazine, CSO Magazine, Federal News Radio, The Herald-Tribune, Naked Security, and many more. 

Anthony previously wrote about the finance industry before moving into the information security field, and received notoriety as a financial freelance journalist, including having numerous articles published by leading media syndicates such as The Chicago Sun-Times, Business Week’s Business Exchange, Seeking Alpha, InvestorCentric, OpenSalon, Bear Market Investments, Alacra Pulse, ML-Implode, and dozens more.

Anthony also previously worked as a consultant to senior members of product development, secondary and capital markets from the largest financial institutions in the country, and he had a front row seat to the bursting of the credit bubble.

Basic Information
Gender
Male
ANTHONY M. FREED's +1's are the things they like, agree with, or want to recommend.
Let Me Tell You Some Akamai Security Stories - The Akamai Blog
blogs.akamai.com

I'm a journalist by trade, with two decades of newspaper reporting and editing behind me. I've spent the last decade writing about informati

SCM: System Hardening... Made Easy
www.slideshare.net

System Hardening is the act of reducing the attack surface in information systems and minimizing their vulnerabilities in accordance with: R

nCircle
plus.google.com

nCircle is the leading provider of automated security and compliance auditing solutions

Metricon 8 - This Con Was a Bit Different...
www.tripwire.com

Well, Metricon 8 came and went along with RSA. This con was a bit different - not even a conference, but a working session. Pete Lindstrom (

RSA Conference Attendees Respond: "If I Were a CISO..."
www.tripwire.com

At the RSA Conference, we asked attendees to share with us what they would happen if they became a chief information security officer (CISO)

RSA 2013 Finale: It's Really All About the People
www.tripwire.com

RSAC 2013 has finally come to an end. All in all, if you can look beyond the hype and rampant commercialism that is the trademark of this, t

Techniques to Instill Confidence in Security
www.tripwire.com

Here are two ugly realities about security: Everyone is concerned with their level of security. 100% security is an impossibility. If you ca

What Would You Do If You Became CISO?
www.tripwire.com

It’s good to be the king…or is it? The Chief Information Security Officer or CISO is a position to strive for, avoid, and run away from if y

Security BSidesSF Goes Above and Beyond
www.tripwire.com

For those of you who were lucky enough to be at Security BSides San Francisco 2013, you already know what we know - the event went off witho

RSA Conference
plus.google.com

#rsac, #security, #cybersecurity, #bigdata, #networking

The Convergence of DevOps and Security
www.tripwire.com

Next week is the big RSA Conference in the US (San Francisco), and I'm really looking forward to leading a panel discussion on "Making Rugge

Security Visualization: AfterGlow Cloud
www.tripwire.com

One of the leading thinkers in the realm of security visualization is Raffael Marty, he literally wrote the book on the topic.“Applied Secur

20 Critical Security Controls: Control 4 - Continuous Vulnerability Asse...
www.tripwire.com

Today's post is all about Control 4 of the CSIS 20 Critical Security Controls - Continuous Vulnerability Assessment and Remediation (the las

Beyond the PCI Checkbox. Customer Success Story.
www.tripwire.com

We have many customers who originally have bought Tripwire to comply with a PCI audit. However, we have found that when our Professional Ser

U.S. to friend and foe: Come visit our network flea market!
blogs.csoonline.com

Is it sad that a lot of us find humor and indifference in just how easy it is to rummage through the government's computer networks? Per

Announcement from Infosec Island Members: TakeDownCon: Special Discounts...
www.linkedin.com

Special Training Promotion for Infosec Island Members Sign up for any of the trainings, and enjoy the following: 1. 15

Infosec Island - Apps on Android Market
market.android.com

Infosec Island is the premier resource for all IT and Information Security-related news, articles and commentary. Join the largest IT Securi

First documented case of cyber espionage? - Forbes
www.forbes.com

There have been so many examples of cyber espionage that it is now the norm to just accept that it is rampant.  MI5 in the UK, the German Ch