Security Impact of Tech Bubble Burst

Are We Sitting On Another Technological Bubble? There has been a buzz around Silicon Valley and beyond for the last year that we’re in the midst of another technological bubble. Respected and experienced investors have expressed concern of a “correction” in the technology sector, stressing that disorganization and poor investments by venture capitalists and “angel” [...]

By | August 21st, 2015|News|Comments Off on Security Impact of Tech Bubble Burst

Encrypted Malware Analysis

DOWNLOAD WHITE PAPER The analysis of encrypted malware utilizes traditional Dynamic Analysis, Active Memory Analysis and cutting edge “Trace Analysis”, allowing for a more holistic approach towards malware analysis from three differing perspectives. All three “prongs” of this methodology involve the analysis of “Data In Execution” which significantly reduces, and in some cases negates, the effectiveness of the anti-forensic [...]

By | September 3rd, 2014|Malware, News|Comments Off on Encrypted Malware Analysis

Observational Malware Analysis

DOWNLOAD WHITE PAPER The idea and practice of encrypting or obfuscating malware has been around since the early to mid 1980s. Malware authors quickly realized that to be successful at introducing and spreading their creations; they would need to take steps to not only conceal the malware’s behavior, but they would need to take steps [...]

By | August 6th, 2014|Malware, News|Comments Off on Observational Malware Analysis

Download the Forensic Imaging White Paper

One of the most common questions from clients in the beginning stages of a forensic investigation is “Why do we need to create a forensic image?” Download the most recent SpearTip whitepaper and learn about: Active File Integrity The Filesystem Forensic Imaging Process Windows Registry Challenges of SSD Evidence Preservation […]

By | June 1st, 2014|News|Comments Off on Download the Cyber Warfare and Advanced Malware Threat Brief

Cyber Counterintelligence – ShadowSpear Service

SpearTip’s Cyber Counterintelligence – ShadowSpear Service is the service upon which our proprietary Fusion Cell Analysis Methodology is grounded. By utilizing Fusion Cell Methodology, SpearTip is able to collect various data points from numerous intelligence collaborators, monitor criminal servers, and optimize the integration of open source collection. SpearTip also unitizes its own case repository to produce actionable [...]

By | May 5th, 2014|News|Comments Off on Cyber Counterintelligence – ShadowSpear Service

Download the Computer Forensics Early Case Assessment & Triage White Paper Now

Cyber forensics can greatly enable a client when responding to and thwarting unfair competition by departing employees, even in the absence of restrictive covenants. They may also give a client leverage against the competitor who retains the former employee. Our Computer Forensics Early Case Assessment & Triage White Paper will help you to prevent data [...]

By | March 15th, 2014|News|Comments Off on Download the Computer Forensics Early Case Assessment & Triage White Paper Now

Human Threat and Cyber Counterintelligence – an Agent’s Perspective

Earlier this month we recognized our nation’s veterans as we do each year on November 11th. SpearTip itself is founded by and staffed largely by veterans, myself included. We at SpearTip would like to take this opportunity to offer our thanks to our brothers and sisters in arms that have served and are serving now [...]

By | November 26th, 2013|News|Comments Off on Human Threat and Cyber Counterintelligence – an Agent’s Perspective

Cyber Threats: The Rogue Insider and the Critical Role of HUMINT

The world of intelligence collection is comprised of a multitude of “INTs”. They run the gamut from, Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), Measurement and Signature Intelligence (MASINT), and Geospatial Intelligence (GEOINT), to Open-source Intelligence (OSINT). Yet there is one “INT” that may be the most valuable in determining if an organization’s cyber security posture [...]

By | September 30th, 2013|News|0 Comments