Scott Nusbaum

Principal Research Analyst

Experience

Over 14 years of experience in software development and 10 years in Information Security. Experience range from Material Handling, Banking, to the Defense Industry.

Education & Certifications

  • BS in Computer Engineering, University of Cincinnati.
  • Masters in Computer Science with a focus on Cyber Informatics, University of Cincinnati.
  • GIAC Reverse Engineering Malware (GREM)

Passion for Security

Scott has always been fascinated with computers and software. He started programming in Elementary and has never stopped. Scott is passionate about learning the internal workings of software and systems. This led to Reverse Engineering, Malware, exploits and CTF.

Recent Blog Posts

TrustedSec Security Blog OneNote Malware Analysis

New Attacks, Old Tricks: How OneNote Malware is Evolving

1    Analysis of OneNote Malware A lot of information has been circulating regarding the distribution of malware through OneNote, so I thought it would be fun to look at a sample. It turns out there are a lot of similarities between embedding malicious code into a OneNote document and the old macro/VBA techniques for Office...
Read

LastPass Security Vulnerability: How Credentials are Accessed in Memory

In this video, our Principal Research Analyst Scott Nusbaum goes over his research on LastPass Password Manager. He discusses how the credentials are exposed in memory to an attacker that is present on the host and is able to access the browser process. He also goes over on how LastPass could modify their extension to...
Read

Video Blog: Using DLL Persist to Avoid Detection

During an Incident Response case, the TrustedSec IR team came across a novel method used by an attacker to maintain access to the target’s servers. After gaining access to the systems, the attacker then modified a DLL required by a service to include malicious code. This video demonstrates a similar process for embedding malicious code...
Read
View all posts from Scott

Recent Webinars

The Ransomware Environment: Going Beyond the Headlines

Join TrustedSec for our latest webinar on Thursday, July 1 at 1PM Eastern Recent attacks on corporations  and government agencies to disrupt critical infrastructure have grabbed headlines across the media landscape in recent months. And while these stories capture some...
View all webinars from Scott

Recent Podcasts

Want to work with Scott Nusbaum or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us