-
Musk Warns Starlink Could Attract Russian Bombs
PRIVACY PRIVACY Satellite comms system is helping Ukraine stay online Read More
-
Gartner: SSE is SASE minus the SD-WAN
PRIVACY PRIVACY Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner. Read More
-
Counterfeit and Pirated Imports Surge During Pandemic
PRIVACY PRIVACY Europol report warns of risk to economy and citizens’ health Read More
-
Ukraine Set to Join NATO Cyber Hub
PRIVACY PRIVACY Members voted unanimously to admit Eastern European nation Read More
-
How attackers sidestep the cyber kill chain
PRIVACY PRIVACY The idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find vulnerabilities, get malware into victim systems, connect to a command-and-control (C2) server, move laterally to find juicy targets, and finally exfiltrate the stolen data. Attackers can…
-
CISOs are still chiefs in name only
PRIVACY PRIVACY Look around the CISO community, and you’ll find signs of burnout everywhere. Where CISOs aren’t just quitting, you’ll find increasing tension between them and their executives, sometimes resulting in surprising departures. Ply a friendly CISO with their favorite alcoholic beverage and a promise of being off-the-record, and you’ll hear stories that’ll raise your…
-
Conti ransomware, which leaked ransomware victims’ data, has its own data leaked
PRIVACY PRIVACY Oh how embarrassing for the criminal gang who extorted millions from businesses by threatening to leak their data, that someone leaked some 160,000 messages between their members as well as their malware source code. Read More
-
Friday Squid Blogging: Far Side Cartoon
PRIVACY PRIVACY Squid, of course. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
Nvidia hackers release code-signing certificates that malware can abuse
PRIVACY PRIVACY The hacker group that recently broke into systems belonging to graphics chip maker Nvidia has released two of the company’s old code-signing certificates. Researchers warn the drivers could be used to sign kernel-level malware and load it on systems that have driver signature verification. The certificates were part of a large cache of…
-
Conti Ransomware Group Diaries, Part III: Weaponry
PRIVACY PRIVACY Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it’s like to be an employee of Conti’s sprawling organization. Today’s Part III looks at how Conti abused a panoply of popular commercial security…