Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:47 PM
Dark Reading
Dark Reading
Products and Releases

CounterTack Names New Chief Researcher

Sean Bodmer has more than 16 years of security assurance experience

WALTHAM, Mass. (November 13, 2012) – CounterTack, the industry's first and only provider of in-progress cyber attack intelligence and response solutions, today announced the hiring of Sean Bodmer as the company's chief researcher of counter-exploitation intelligence, effective immediately. Bodmer, former senior threat intelligence analyst for Damballa, brings a unique background and industry perspective to advanced threat detection and analysis. Bodmer has been a highly visible authority on the frontlines of cyber security. His experience has ranged from building advanced honeynets and advanced intrusion detection systems to conducting internal research and military intelligence field operations.

"Joining a company like CounterTack, which has built a strong reputation as an innovator in advanced threat detection, was an easy decision," said Bodmer. "I look forward to enhancing that reputation by advancing and building on the company's research into threat counter-exploitation intelligence in support of its mission to tackle today's most daunting organized and persistent threats and their crimeware tools, tactics, and techniques."

An oft-cited and published cyber security expert, Bodmer has more than 16 years of security assurance experience. As senior threat intelligence analyst for Damballa, Bodmer served as threat intelligence team lead, where he was responsible for leading the counter-intelligence, counter-exploitation, malware analysis, and crimeware infrastructure analysis activities. Prior to his work at Damballa, Bodmer worked in the Washington D.C. metropolitan area for more than a decade supporting U.S. defense and intelligence agencies as a subject matter expert in his fields of practice in computer network defense and exploitation. Bodmer co-authored Hacking Exposed: Malware and Rootkits and Reverse Deception Organized Cyber Threat Counter-Exploitation, both published by McGraw-Hill in 2009 and 2012, respectively.

"Sean's depth of experience on the frontlines of cyber security research and programming will bring CounterTack customers a deeper understanding of the dangers, permutations and constant evolution of advanced, targeted attacks," said Neal Creighton, chief executive officer at CounterTack. "His research and industry perspectives will also ensure CounterTack continues building and enhancing our detection capabilities to meet pace with the ever-changing nature of threats from today's most sophisticated and determined adversaries."

In addition to heading up CounterTack's research team and helping to advance the company's detection capabilities, Bodmer also rounds out a strong bench of company experts and will take an active role in shaping the CounterTack blogand advancing industry discussions around advanced malware threats and detection.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS Build 20210202 and later Q...
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...