About Daniel M. Teal

Daniel M. Teal, a Senior Architect at Lumension, is a twenty four year veteran of the computer security field. Dan was CTO at CoreTrace Corporation prior to the 2012 acquisition and is a graduate of the Massachusetts Institute of Technology. He also spent time at the Air Force Information Warfare Center (AFIWC) as a specialist in the field of intrusion detection.

Follow Daniel M. on Twitter @danteal

 

By: - Senior Architect

@danteal

Stealthy Malware is Never Invisible

August 5th, 2014

New malware identified as ‘Poweliks’ is currently in the news because of its stealthy nature.  The malware does not reside as a file on the disk, rather it is stored in the registry and uses some interesting tricks to execute at startup and remain hidden from system administrators.  The full description of the malware can […]



By: - Senior Architect

@danteal

People Are Your Last Line of Defense

April 29th, 2014

The increasing numbers of attacks profiled in news reports over the last several months demonstrate that we live in an unsecure world.  The Target breach in particular shows how important a complete cyber security program is to an enterprise network environment.  Target’s security systems generated events from the attack, but the events were not followed […]



By: - Senior Architect

@danteal

Heartbleed and CRLs

April 14th, 2014

The “Heartbleed” vulnerability in the OpenSSL cryptographic library released this week has impacted over a half million web sites and untold numbers of user accounts. Attackers can exploit this vulnerability to read the memory of affected systems to obtain secret keys, user passwords, and any other sensitive data stored in the memory of the web service.  […]



By: - Senior Architect

@danteal

Defending Against Java

July 24th, 2013

Java offers enterprises the ability to write code once and run it everywhere.  However, this flexibility comes with a high cost: reduced security on endpoints. It has lately gotten so bad that Java has been nicknamed Just Another Vulnerability Announcement. Oracle has been working to produce updates to Java that addresses these vulnerabilities, but many […]



By: - Senior Architect

@danteal

Detecting RMI – Hiding Under the Covers Part II

June 5th, 2013

“All warfare is based on deception” – Sun Tzu, The Art of War My previous post, “Hiding under the Covers”, reviewed the advantages that attackers gain through the use of Reflective Memory Injection (RMI) techniques. In follow up, let’s take a look at methods to detect injected libraries. One of the most powerful penetration testing […]



By: - Senior Architect

@danteal

Hiding Under the Covers

May 15th, 2013

“All warfare is based on deception” – Sun Tzu, The Art of War Attackers like stealth.  Once they have compromised a system, one of their primary goals is to remain undetected. Initially, attackers used malware with pseudo Windows service names such as svchosts.exe, winlogin.exe, lsasss.exe, and others. Although these names appear to be innocuous, power […]




IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us

blog.lumension.com