Tyler Hudak
Practice Lead, Incident Response
Experience
Tyler has over 20 years of real-world experience in incident handling, malware analysis, computer forensics, and information security for multiple organizations. He has spoken and taught at a number of security conferences about topics ranging from incident response to penetration testing techniques.
Education & Certifications
- BS Computer Science, University of Akron
- GIAC Certified Forensic Analyst (GCFA)
- GIAC Certified Forensic Examiner (GCFE)
Industry Contributions
MASTIFF Static Analysis Framework
Passion for Security
Tyler’s passion for incident response stems from his love of solving puzzles. He uses this ambition to get to the bottom of issues at hand; whether it’s forensic analysis of a disk, reverse engineering or malware, or the latest CTF contest, Tyler is driven to uncover every detail.
Recent Blog Posts
On May 31, 2023, Progress Software released a security bulletin concerning a critical vulnerability within MOVEit Transfer, a widely used secure file transfer system. According to Shodan, over 2500 servers running this software are on the Internet. TrustedSec has performed analysis on the vulnerability and post-exploitation activities. CVE-2023-34362 has been assigned to this vulnerability. This...
Read
Threat Overview Around February 03, 2023, a ransomware campaign called “ESXiArgs” emerged that targeted Internet-facing VMware ESXi servers running versions older than 7.0. Though not confirmed, it has been reported by the French CERT (CERT-FR), BleepingComputer, and other sources that the campaign leverages CVE-2021-21974, which is a three-year-old vulnerability in the OpenSLP component of the...
Read
tl;dr Communications are critical during an incident. If you cannot coordinate, collaborate, and inform actions and information about an incident, the incident response will eventually fail. Normally, this isn’t an issue, as organizations have resources like Microsoft 365 email, SharePoint, Slack, and Teams to use to communicate with each other. However, what happens when those...
Read
Recent Webinars
Panelists: Carlos Perez, Liz Waddell Guest: Tyler Hudak Keeping pace with the rapidly evolving cybersecurity industry while comprehending the bigger picture is a challenge for every security practitioner. Effectively translating insights into practical improvements for your craft and security team...
Threat hunting is an essential component of any modern security program, providing a proactive approach to detecting threats. As attackers become more sophisticated, it’s crucial to go beyond entry-level techniques and tactics. However, most webinars and trainings on threat hunting...
Presented by TrustedSec & Binary Defense on December 14, 2021. During this live webcast we are covering the latest news and guidance on the Log4j vulnerability and what organizations can do to detect and respond to it. We will discuss...