Rod Soto has over 15 years of experience in information technology and security. He is a security researcher and co founder of Hack The Valley %27.He has spoken at ISSA, ISC2, OWASP, DEFCON, BlackHat, RSA, Hackmiami, DerbyCon, Bsides and also been featured in Rolling Stone Magazine, Pentest Magazine, Univision and CNN. Rod Soto was the winner of the 2012 BlackHat Las vegas CTF competition and is the founder and lead developer of the Kommand && KonTroll competitive /No QRTR hacking Tournament series.
The ability of an actor to remain undiscovered or obfuscating its doings when driving a malicious campaign usually affects the gains of such campaigns.
Despite the downturn in cryptocurrency price, malicious actors have not stopped developing cryptocurrency mining payloads.
JASK Lead Threat Analyst Kevin Stear and Director of Security Research Rod Soto tackle “Border Gateway Protocol (BGP) Hijacking.”
This spam is just one example of how malicious actors shift their attack vectors in response to effective the industry measures, still finding ways into a system.
Discover a real-time approach for automatically profiling VIP accounts and detecting potential misused.
VIP accounts are targeted as they provide a faster path to resources, data and control of an organization.
The cybercrime threatscape is constantly changing as hackers adapt and repurpose the use of many different types of tools and attack vectors.
This particular vulnerability can be exploited remotely, requires no authentication or elevated user privileges.
In our newest threat advisory, we explore the process of detection and mitigation of SamSam.
Supply chain attacks target the less-secure elements of an organizations supply chain network.
Recent reports indicate a new wave of footprinting and implantation by a modified version of DoublePulsar,
Distributed denial of service (DDoS) attacks present a force and power to be reckoned with.
NoSQL technology has become popular thanks to new open-source NoSQL databases.
A browser extension is a plug-in that extends the functionality of a web browser.
Compromise and leak of people’s passwords happen so frequently, that its a normal fact of life.
It is really not difficult to find these frameworks as many vulnerability scanners are available on the internet.
Exploit kits are very efficient tools used in the cybercrime underground to detect vulnerabilities.
A new vulnerability affecting the popular content management system (CMS) framework Drupal was found.
New vulnerabilities found in the SAMBA require more than static signature defense technologies.
This attack allows bad actors to hijack the targeted organization’s domain without actually hijacking it.
Blockchain is a technology framework that was created along with Bitcoin (BTC) in 2008.
Cryptocurrencies are driving malicious actors to implement payloads allow them to mine cryptocurrency.
Chiron is an innovative solution developed by part of JASK’s team, Rod Soto and Joseph Zadeh.
A series of vulnerabilities have been disclosed affecting the most popular computer processors.
Attacks have waves of innovation and then plateau, only to come back as part of other new exploits.
SSO represents a single point of failure and a driving factor for credential reuse/extraction attacks.
The spread of an infectious worm distributing Petya is currently targeting the Ukraine infrastructure.
The Ransomware strain “WannaCry” is currently on a devastating run in the United Kingdom.