About Daniel M. Teal

Daniel M. Teal, a Senior Architect at Lumension, is a twenty four year veteran of the computer security field. Dan was CTO at CoreTrace Corporation prior to the 2012 acquisition and is a graduate of the Massachusetts Institute of Technology. He also spent time at the Air Force Information Warfare Center (AFIWC) as a specialist in the field of intrusion detection.

Follow Daniel M. on Twitter @danteal


By: - Senior Architect


Heartbleed and CRLs

April 14th, 2014

The “Heartbleed” vulnerability in the OpenSSL cryptographic library released this week has impacted over a half million web sites and untold numbers of user accounts. Attackers can exploit this vulnerability to read the memory of affected systems to obtain secret keys, user passwords, and any other sensitive data stored in the memory of the web service.  [...]

By: - Senior Architect


Defending Against Java

July 24th, 2013

Java offers enterprises the ability to write code once and run it everywhere.  However, this flexibility comes with a high cost: reduced security on endpoints. It has lately gotten so bad that Java has been nicknamed Just Another Vulnerability Announcement. Oracle has been working to produce updates to Java that addresses these vulnerabilities, but many [...]

By: - Senior Architect


Detecting RMI – Hiding Under the Covers Part II

June 5th, 2013

“All warfare is based on deception” – Sun Tzu, The Art of War My previous post, “Hiding under the Covers”, reviewed the advantages that attackers gain through the use of Reflective Memory Injection (RMI) techniques. In follow up, let’s take a look at methods to detect injected libraries. One of the most powerful penetration testing [...]

By: - Senior Architect


Hiding Under the Covers

May 15th, 2013

“All warfare is based on deception” – Sun Tzu, The Art of War Attackers like stealth.  Once they have compromised a system, one of their primary goals is to remain undetected. Initially, attackers used malware with pseudo Windows service names such as svchosts.exe, winlogin.exe, lsasss.exe, and others. Although these names appear to be innocuous, power [...]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us