Luke Richards

Luke Richards

Threat Intelligence Lead

Luke is the Threat Intel Lead for Vectra. He has been with the company for 4 years, joining as a consultant analyst and working with customers and high level incident response directly. Before joining Vectra, Luke was a senior Security Analyst for an international Engineering and Defence contractor where he developed SOC toolsets, processes and incident response playbooks.

Posts from

Luke Richards

OpenSSL Security Advisory
November 1, 2022
|
By
Luke Richards
OpenSSL Security Advisory

On November 1st 2022, after teasing the main show the week before, OpenSSL released their advisory describing two risks to OpenSSL 3.0.0 - 3.0.6. This was originally teased as a Critical level alert, which would have been the first Critical since 2015, however this was downgraded to a High owing to what OpenSSL describe as "mitigating factors".

Read More
What If there was a Supply Chain Compromise of an IDP like Okta?
March 25, 2022
|
By
Luke Richards
What If there was a Supply Chain Compromise of an IDP like Okta?

What If there was a Supply Chain Compromise of an IDP? The recent security incident at Okta represents yet another perspective on supply chain compromises. This blog provides perspective on the current situation and mitigation and defense strategies to manage such an event.

Read More
Russian Cyber Attacks: What We Know so far
March 9, 2022
|
By
Luke Richards
Russian Cyber Attacks: What We Know so far

Updated perspective on cyberthreats as a result of ongoing Ukrainian/Russian conflict, including specific custom recall queries, and aggregation of common Russian state actor TTPs.

Read More
Mitigating, Detecting, and Responding to Russian Cyberactivity
February 23, 2022
|
By
Luke Richards
Mitigating, Detecting, and Responding to Russian Cyberactivity

Vectra customers should be aware that current global events related to Russian recognition of separatist regions of the Ukraine carry with them the risk of increased cyber activity conducted by Russian state level actors. This includes evidence that the FSB, the main Intelligence Organization in Russia, is responsible for the DDoS against Ukrainian systems in February 2022.

Read More
Log4Shell - The Evolution of an Exploit
December 15, 2021
|
By
Luke Richards
Log4Shell - The Evolution of an Exploit

A few days after the Log4Shell vulnerability was discovered, we now have more observations about how the exploit is being leveraged. Here's what we know, today.

Read More
CVE-2021-44228 Log4J Zero Day Affecting… The Internet
December 10, 2021
|
By
Luke Richards
CVE-2021-44228 Log4J Zero Day Affecting… The Internet

A new 0day was discovered in the log4j application on December 10, 2021. This vulnerability impacts a widely used logging solution spanning an incredibly large attack surface.

Read More
Putting CVE-2021-1675 PrintNightmare to Rest
July 2, 2021
|
By
Luke Richards
Putting CVE-2021-1675 PrintNightmare to Rest

A new remote code execution vulnerability in Windows Print Spooler, now known as CVE-2021-1675, or PrintNightmare can be exploited by attackers to take control of affected systems. Find out how to detect and stop this exploit with Vectra.

Read More
SolarWinds Orion Hack: What To Know and How to Protect Your Network
December 15, 2020
|
By
Luke Richards
SolarWinds Orion Hack: What To Know and How to Protect Your Network

Discover what you need to know about the SolarWinds Orions compromise, how it unfolded and why monitoring users in the cloud is imperative to protect your enterprise.

Read More
Encrypted Command and Control: Can You Really Cover Your Tracks?
July 16, 2019
|
By
Luke Richards
Encrypted Command and Control: Can You Really Cover Your Tracks?

Most sessions on the internet today are encrypted. By any measure, more than half of all internet traffic uses TLS to encrypt client/server communication.

Read More