Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

09:30 AM

Invisible Things Comes to Light

Joanna Rutkowska gives the lowdown on what her new company will do

5:30 PM -- Just a few days after researcher Joanna Rutkowska went public with the name of her new startup Invisible Things Lab and even before its Website went live, another Website was suspiciously already up and running with the same name (but with a .net suffix).

Rutkowska has been secretive about just what Invisible Things Lab is really up to, preferring to talk more about her upcoming training sessions at Black Hat USA. So she was surprised to see a company or fake firm possibly trying to ride her coattails already. But imitation is the highest form of flattery. (See Rutkowska Launches Own Startup.)

Rutkowska says her site is now live, and she's now sharing details of just what this new company (made up of her and fellow researcher Alex Tereshkin, aka "90210") is all about. She says the firm will focus on operating system security, as in system compromises, stealth malware, antivirus and host intrusion prevention assessment, and OS-hardening, for instance. It won't be doing application security.

Invisible Things Lab will work with security vendors such as AV and OS vendors that want their products assessed before they go to market, Rutkowksa says, as well as with enterprises that want unbiased security evaluations of products they are shopping for. The company also will work with government, law enforcement, and forensics investigators that want to learn more about stealth malware, or need help with their "interesting" investigations, she says. "We're not really interested in fighting the "usual" incidents -- spam, worms, traditional botnets -- we would like to focus on more subtle and more sophisticated incidents."

She hopes to work with vendors who want to bounce their ideas off her and Tereshkin, or those who want advice on potential risks. "We could either do the product-oriented assessment or more design-oriented consulting, where the latter has an advantage of allowing our clients not to share all their trade secrets with us, which I know is very important for many vendors," she says.

This doesn't mean Rutkowska is going all business, though. Research is still her main interest. "I hope that every project will require some new research," she says. "Otherwise, it would be boring work. We're definitely not interested in routine tasks," such as traditional penetration testing, she says.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, improper validation of data may cause the system to write outside the intended buffer area, which may allow arbitrary code execution.
PUBLISHED: 2019-10-18
In Horner Automation Cscape 9.90 and prior, an improper input validation vulnerability has been identified that may be exploited by processing files lacking user input validation. This may allow an attacker to access information and remotely execute arbitrary code.