Principal Security Consultant
Over 14 years of experience in software development and 10 years in Information Security. Experience range from Material Handling, Banking, to the Defense Industry.
Education & Certifications
BS in Computer Engineering and Masters in Computer Science with a focus on Cyber Informatics from the University of Cincinnati. GIAC Reverse Engineering Malware (GREM)
Passion for Security
Scott has always been fascinated with computers and software. He started programming in Elementary and has never stopped. Scott is passionate about learning the internal workings of software and systems. This led to Reverse Engineering, Malware, exploits and CTF.
Recent Blog Posts
In this video, Senior Incident Response & Research Consultant Scott Nusbaum demonstrates a method to extract and deobfuscate code from a malicious document. Upon rendering the code readable, Nusbaum works to gain an understanding of the goals the malware was attempting to accomplish and the processes by which it undertook that effort. This video is...
Wanted: TScopy Tool Testers GitHub Repo https://github.com/trustedsec/tscopy Introducing TScopy It is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the filesystem. Sometimes these files are locked by the operating system (OS) because they are in use, which is particularly frustrating with event logs and registry hives. TScopy...
Microsoft recently released a patch for all versions of the Microsoft Exchange server. This patch fixes a Remote Code Execution flaw that allows an attacker to send a specially crafted payload to the server and have it execute an embedded command. Researchers released proof of concept (POC) exploits for this vulnerability on February 24, 2020....