Supply Chain Vulnerabilities

This article began with ShadowHammer as the primary topic, a scathing rebuke of ASUS for their total lack of effort in securing an unnecessary utility that they install on every system they ship. However I then saw the news about OfficeDepot’s System Health Checker tool being a complete sham designed to pressure people into purchasing software and services they do not need which triggered memories of other similar betrayals. I can easily recall a dozen times “trusted third party vendors” were responsible for a breach: CCLeaner, a utility designed to improve performance, delivered malware. The malware ShadowPad was baked into popular server management tools. Saks Fifth Avenue and Lord & Taylor: 3rd party provided point of sale system. BestBuy, Sears, Kmart, Delta: customer service vendor. Corporation Service Company: unknown vendor. UnderArmour: MyFitnessPal (Acquired vulnerable environment) UMG: Cloud Storage provider. Target: HVAC contractor. Applebee’s: 3rd party provided point of sale system…

0 Comments

Promotion! Ender Greer, Director of Professional Services – Offensive Security

We are pleased to announce the promotion of Ender Greer to Director of Professional Services - Offensive Security. Ender has been with Critical Path Security since the beginning, during which time he has held the position Senior Security Engineer, proving himself to be a committed advocate of Information Security. Ender, a Veteran of the United States Army, came to Critical Path Security bringing with him energy, discipline, and enthusiasm that he has continued to use while leading his employees to consistently improve the delivery of security and compliance audits. His background in Information Security, Compliance, and Offensive Security gives him an overall understanding of how to improve customer satisfaction with ongoing and cutting edge engagements, and his ability to motivate his team has led to his continued success in the United States,  Canada, Mexico, Ireland and Iraq. Ender has spoken at many conferences over the years, including Advisen, where he…

0 Comments

New Platform Release: Warrior’s Code

Today's release started out with just a handful of new features planned, but as usual, the team just couldn't help themselves from going all in. Perhaps it was the release name that inspired them to challenge themselves; if so we will need to add more battle oriented release names to our road-map because the end result is incredible! Critical Path Security is very proud to announce the latest release of Léargas, Warrior's Code! Cloud Based Hosts - Our clients can now include their hosted Windows and Linux servers into the Léargas monitoring sphere, increasing visibility and confidence in their cloud based ecosystem's security configurations! SIP Traffic - Voice over IP isn't anything new, but many network monitoring platforms lack even basic visibility into this vast data-set. Léargas lifts the curtain on SIP Traffic giving our customers the ability to view, aggregate, monitor and alert on detailed call information. Finally a…

0 Comments

Critical Path Security expands managed services to include, “Executive Cyber Protection”!

In today’s society, personal safety, security, and privacy are legitimate concerns. As a solution to the growing problem, Critical Path Security established an Executive Cyber Protection Program for offering executive cyber protection and security to select clients, including High Net Worth Individuals (HNWI) and Ultra High Net Worth Individuals (UHNWI). Our custom designed services are strategically developed, planned and implemented by a blend of cyber security experts to provide peace of mind to our clientele. Critical Path Security specializes in offering discrete executive cyber protection and security services while protecting our client’s anonymity. Our Cyber Security Professionals are experts in planning, threat assessments, threat monitoring, crisis management, and providing emergency incident response. We understand that Executive Cyber Protection requires much more than surrounding a client with well-trained Cyber Security Professionals; our team rely on perpetual monitoring and threat assessments that identify potential risks in order to prevent an incident before it occurs.…

0 Comments