About Andrew Hay

Andrew Hay is an information security industry veteran with close to 20 years of experience as a security practitioner, industry analyst, and executive. As the Chief Information Security Officer (CISO) at DataGravity, Inc., he advocates for the company’s total information security needs and is responsible for the development and delivery of the company’s comprehensive information security strategy.

Andrew has served in various roles and responsibilities at a number of companies including OpenDNS (now a Cisco company), CloudPassage, Inc., 451 Research, the University of Lethbridge, Capital G Bank Ltd. (now Clarien Bank Bermuda), Q1 Labs (now IBM), Nokia (now Check Point), Nortel Networks, Magma Communications (now Primus Canada), and Taima Corp (now Convergys).

Andrew is frequently approached to provide expert commentary on security-industry developments, and has been featured in such publications as Forbes, Bloomberg, Wired, USA Today, International Business Times, Sacramento Bee, Delhi Daily News, Austin Business Journal, Ars Technica, RT, VentureBeat, LeMondeInformatique, eWeek, TechRepublic, Infosecurity Magazine, The Data Center Journal, TechTarget, Network World, Computerworld, PCWorld, and CSO Magazine.

This year marks the first year in my security career that I get to speak at the Black Hat security conference - and I couldn't be more excited. On Tuesday, August 6th at 2:15pm local time, I'll be co-presenting Unveiling The Open Source Visualization Engine For Busy Hackers with Thibault Reuille. Here is the abstract for the talk: The way a human efficiently digests information varies from person-to-person. Scientific studies have shown that some individuals learn better through the presentation of visual/spatial information compared to simply reading text. Why then do vendors expect customers to consume presented data following only the written word...

Read More

About Script to fetch malicious domain and URL lists from sites that publish RSS feeds or raw HTML pages. Download To obtain the tool, please visit https://github.com/andrewsmhay/web2intel and download the associated files or simply run the following command at your command prompt: $ git@github.com:andrewsmhay/web2intel.git Supported Lists The Abuse.ch SSL block list The Quttera malicious, suspicious, and potentially suspicious domains database John Bambenek's Gameover Zeus list DNS-BH – Malware Domain Blocklist SANS Internet Storm Center LOW, MEDIUM, and HIGH confidence block lists Sucuri Security's scanner identified iframe, conditional redirection, and encoded javascript web site list Usage ./web2intel.rb <option> <extras>  For command syntax, please visit the GitHub repository. Example 1 - Domains only $ ./web2intel.rb --sucuri_iframe #Title: Sucuri Research Labs Hidden iframes list #2014-07-20 15:08:14 -0700 ...

Read More

Though Operation Tovar succeeded in temporarily cutting communication between Gameover ZeuS (GoZeus) and its command and control infrastructure, it appears now that GoZeus has migrated from using peer-to-peer communications to domain generation algorithms (DGAs). According to research by our friends over at Malcovery, a “new trojan based heavily on the GameOver Zeus binary…was distributed as the attachment to […]

The post Gameover ZeuS Switches From P2P to DGA appeared first on OpenDNS Security Labs.


Read More