Kevin is a seventeen-year veteran of the Department of Defense (DoD). He first served as a US Navy Chief, where he was deployed three times, and then continued his service in the civilian ranks until 2015. Since his departure from government service, Kevin prototyped the Hadoop-based security data analytics framework at Aetna and then led threat research and content development efforts for RSA Firstwatch.
Kevin holds degrees from Georgetown (B.A. ‘98) and New York University (M.S. ‘06), speaks English and German, lives with his family in Denver, and needs at least 20 days on the mountain.
JASK Lead Threat Analyst Kevin Stear and Director of Security Research Rod Soto tackle “Border Gateway Protocol (BGP) Hijacking.”
The cybercrime threatscape is constantly changing as hackers adapt and repurpose the use of many different types of tools and attack vectors.
This particular vulnerability can be exploited remotely, requires no authentication or elevated user privileges.
In our newest threat advisory, we explore the process of detection and mitigation of SamSam.
Supply chain attacks target the less-secure elements of an organizations supply chain network.
NoSQL technology has become popular thanks to new open-source NoSQL databases.
The U.S. DOJ reported that a large number of routers and storage devices were being actively targeted.
Modern threat actors understand that any public and private data trails can lead to their capture.
Threat actors have embraced botnets’ abilities to scan large blocks of attack surface and exploit machines.