The Shadowserver Foundation 2006 - 2017
Security Research
Volexity 2006 - 2017
Founder
Verizon Business Aug 2011 - Aug 2013
Director of Cyber Intelligence
Etouch Systems Jan 2007 - Aug 2011
It Security Specialist
Dkw Communications, Inc. Jun 2006 - Jan 2007
It Security Engineer
Education:
George Mason University
Masters
Virginia Tech
Bachelors, Bachelor of Science, Business
Systems, methods, and processing devices for aiding with cyber intrusion investigations that includes capabilities for extracting data from a specified range of a volatile memory of a target processing device, reconstructing data structures and artifacts from the extracted data; and generating and presenting a visualization of the reconstructed data structures and the reconstructed artifacts.
SageHaus provides the only professional home service membership to the public, giving everyone peace of mind that a trusted home professional is only a phone call away. Service providers may only be a...
Volexity believes that the Dukes are likely working to gain long-term access into think tanks and (nongovernmental organizations) and will continue to launch new attacks for the foreseeable future, the security firms chief executive, Steven Adair, said in a blog post.
Steven Adair, co-founder of U.S.-based security firm Volexity, said that code hidden on pro-democracy websites last year, including those of the Democratic Party and the Alliance for True Democracy, suggested a group he said "we strongly suspect to be Chinese... who is very well resourced."
Date: Nov 29, 2015
Category: Business
Source: Google
Attackers exploit latest Flash bug on large scale, says researcher
"CVE-2011-2110 is being exploited in the wild on a fairly large scale," said Steven Adair, a researcher with the Shadowserver Foundation, a volunteer-run group that tracks vulnerabilities and botnets. "In particular this exploit is showing up as a drive-by in several legitimate websites, including t
Security experts recommended that other security and infrastructure companies look to their own systems and tighten up security. RSA's contention that the attack is an advanced persistent threat, or APT, could mean that the company believes a government may be behind the attack, says Steven Adair, a security researcher with the Shadowserver Foundation, a group that tracks cyber attacks and botnets.