Principal Security Strategist
Corelight

BIO:

Principal Security Strategist

Articles and Comments By Richard Bejtlich

Expert Commentary
Experts Reaction On CISA And FBI Rebut Reports About Hacked Voter Data On Russian Forum
September 03 , 2020 by Richard Bejtlich
Every election network should be instrumented with a network security monitoring platform that creat...
Expert Commentary
Expert On China Is Now Blocking All Encrypted HTTPS Traffic That Uses TLS 1.3 And ESNI
August 11 , 2020 by Richard Bejtlich
Those who developed TLS 1.3 and ESNI believed that they could enable privacy by encrypting almost ev...
Expert Commentary
Comment: US Congress Wants To Know What Commercial Spyware Other Countries Are Using
June 15 , 2020 by Richard Bejtlich
While it’s useful to understand the prevalence of commercial spyware use by foreign actors, Congre...
Expert Commentary
US Issues Guidance On North Korean Hackers, Offers $5M Reward - Expert Comment
April 16 , 2020 by Richard Bejtlich
Offering a $5 mil award for information to identify and attribute DPRK hackers is a great idea. Itâ€...
Expert Commentary
The DarkHotel (APT-C-06) Attacked Chinese Institutions Abroad via Exploiting SangFor VPN Vulnerability
April 08 , 2020 by Richard Bejtlich
If we accept that Qihoo has correctly attributed this activity to Dark Hotel, and that Dark Hotel is...
Expert Commentary
Experts Insight On A Mysterious Hacker Group Is Eavesdropping On Corporate Email And FTP Traffic
March 31 , 2020 by Richard Bejtlich
The four TCP ports reported in this story are unencrypted communications channels. There are encrypt...
Expert Commentary
Chinese Hacker Group APT41 Uses Recent Exploits To Target Companies Worldwide
March 27 , 2020 by Richard Bejtlich
Intruders continue to target infrastructure, not just endpoints and servers. Defenders cannot ignore...
Expert Commentary
Experts Comments On Cyberspace Solarium Commission Report - US At Risk Of A "Catastrophic cyber-attack"
March 13 , 2020 by Richard Bejtlich
While this is yet another in a long line of reports projecting digital disaster, I was pleased to se...
Expert Commentary
NEC Defense Contracts Info Potentially Compromised In Breach
February 03 , 2020 by Richard Bejtlich
In the early 2000s, defense contractors became the first non-military, non-intelligence targets of a...
Expert Commentary
U.S. Govt Agency Hit With New CARROTBALL Malware Dropper
January 27 , 2020 by Richard Bejtlich
Because of the protocols used in this campaign, network security monitoring practitioners have a cha...
Expert Commentary
Security Experts On Report Highlights Nation-State Cyberthreats Facing SMBs In 2020
December 05 , 2019 by Richard Bejtlich
\"The best, next move for any business that operates a network is to deploy a network security monit...
Expert Commentary
Security Expert Comments On NSA Publishes Advisory Addressing Encrypted Traffic Inspection Risks
November 22 , 2019 by Richard Bejtlich
Many organizations use \"break and inspect\" technologies to gain better visibility into encrypted t...
Expert Commentary
Security Expert Comments On Microsoft Will Integrate DNS Over HTTPS In Windows 10
November 20 , 2019 by Richard Bejtlich
I don\'t know of any network administrators who prefer DNS over HTTPS (DoH) to DNS over TLS (DoT). I...
Expert Commentary
Security Expert Comment: US Homeland Security Official Says Russia Will Try To Interfere In 2020 Election: "They're Going To Be Back"
November 07 , 2019 by Richard Bejtlich
Every election network should be instrumented with a network security monitoring platform that creat...
Expert Commentary
Experts Comments: Sophisticated Russian Hacking Group Is back In Action Again
October 17 , 2019 by Richard Bejtlich
A Russian cyberespionage operation which was one of the groups which hacked into Democratic National...
Expert Commentary
Comments On New Malware Spies On Diplomats, High-Profile Government Targets
October 14 , 2019 by Richard Bejtlich
ESET reported that this campaign began at least seven years ago. Keeping track of network activity o...
Expert Commentary
Commentary On EU Warning Over 5G Security Risks From State-Backed Entities
October 11 , 2019 by Richard Bejtlich
One hundred years ago, oil occupied the \"commanding heights\" heights of the world economy. Today,...
Expert Commentary
Experts On Microsoft Launches CyberPeace Institute To Tackle Attacks
October 01 , 2019 by Richard Bejtlich
As one of the goals of the CyberPeace Institute is to analyze and investigate attacks, it makes sens...
Expert Commentary
Comments: US Military Veterans Targeted By Iranian State Hackers
September 26 , 2019 by Richard Bejtlich
When encountering a story like this, the first question CISOs and security teams ask is “are we af...
Expert Commentary
Newly Discovered Cyber-Espionage Malware Abuses Windows BITS Service
September 10 , 2019 by Richard Bejtlich
As noted in the story by Catalin Cimpanu, other threat groups have conducted command-and-control usi...
Expert Commentary
Glupteba Malware Uses Bitcoin Blockchain To Update C2 Domains
September 06 , 2019 by Richard Bejtlich
In a report published September 4, 2019, Trend Micro reported its analysis of a new variant of Glupt...
Expert Commentary
Attackers Use Backdoor And RAT Cocktail To Target The Balkans
August 16 , 2019 by Richard Bejtlich
Thanks to this ESET report, network defenders have a rich variety of network indicators of compromis...