Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

09:30 AM

Invisible Things Comes to Light

Joanna Rutkowska gives the lowdown on what her new company will do

5:30 PM -- Just a few days after researcher Joanna Rutkowska went public with the name of her new startup Invisible Things Lab and even before its Website went live, another Website was suspiciously already up and running with the same name (but with a .net suffix).

Rutkowska has been secretive about just what Invisible Things Lab is really up to, preferring to talk more about her upcoming training sessions at Black Hat USA. So she was surprised to see a company or fake firm possibly trying to ride her coattails already. But imitation is the highest form of flattery. (See Rutkowska Launches Own Startup.)

Rutkowska says her site is now live, and she's now sharing details of just what this new company (made up of her and fellow researcher Alex Tereshkin, aka "90210") is all about. She says the firm will focus on operating system security, as in system compromises, stealth malware, antivirus and host intrusion prevention assessment, and OS-hardening, for instance. It won't be doing application security.

Invisible Things Lab will work with security vendors such as AV and OS vendors that want their products assessed before they go to market, Rutkowksa says, as well as with enterprises that want unbiased security evaluations of products they are shopping for. The company also will work with government, law enforcement, and forensics investigators that want to learn more about stealth malware, or need help with their "interesting" investigations, she says. "We're not really interested in fighting the "usual" incidents -- spam, worms, traditional botnets -- we would like to focus on more subtle and more sophisticated incidents."

She hopes to work with vendors who want to bounce their ideas off her and Tereshkin, or those who want advice on potential risks. "We could either do the product-oriented assessment or more design-oriented consulting, where the latter has an advantage of allowing our clients not to share all their trade secrets with us, which I know is very important for many vendors," she says.

This doesn't mean Rutkowska is going all business, though. Research is still her main interest. "I hope that every project will require some new research," she says. "Otherwise, it would be boring work. We're definitely not interested in routine tasks," such as traditional penetration testing, she says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
10 iOS Security Tips to Lock Down Your iPhone
Kelly Sheridan, Staff Editor, Dark Reading,  5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-27
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
PUBLISHED: 2020-05-27
sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated address, which leads to an out-of-bounds read during sdhci_write() operations. A guest OS user can crash the QEMU process.
PUBLISHED: 2020-05-27
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
PUBLISHED: 2020-05-27
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
PUBLISHED: 2020-05-27
IBM MobileFirst Platform Foundation stores highly sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 175207.