News
-
Musk Warns Starlink Could Attract Russian Bombs
Satellite comms system is helping Ukraine stay online Read More
-
Gartner: SSE is SASE minus the SD-WAN
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner. Read More
-
Counterfeit and Pirated Imports Surge During Pandemic
Europol report warns of risk to economy and citizens’ health Read More
-
Ukraine Set to Join NATO Cyber Hub
Members voted unanimously to admit Eastern European nation Read More
-
How attackers sidestep the cyber kill chain
The idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform reconnaissance, find vulnerabilities, get malware into victim systems, connect to a command-and-control (C2) server, move laterally to find juicy targets, and finally exfiltrate the stolen data. Attackers can be caught…
-
CISOs are still chiefs in name only
Look around the CISO community, and you’ll find signs of burnout everywhere. Where CISOs aren’t just quitting, you’ll find increasing tension between them and their executives, sometimes resulting in surprising departures. Ply a friendly CISO with their favorite alcoholic beverage and a promise of being off-the-record, and you’ll hear stories that’ll raise your hackles: CISOs…
-
Conti ransomware, which leaked ransomware victims’ data, has its own data leaked
Oh how embarrassing for the criminal gang who extorted millions from businesses by threatening to leak their data, that someone leaked some 160,000 messages between their members as well as their malware source code. Read More
-
Friday Squid Blogging: Far Side Cartoon
Squid, of course. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
Nvidia hackers release code-signing certificates that malware can abuse
The hacker group that recently broke into systems belonging to graphics chip maker Nvidia has released two of the company’s old code-signing certificates. Researchers warn the drivers could be used to sign kernel-level malware and load it on systems that have driver signature verification. The certificates were part of a large cache of files that…
-
Conti Ransomware Group Diaries, Part III: Weaponry
Part I of this series examined newly-leaked internal chats from the Conti ransomware group, and how the crime gang dealt with its own internal breaches. Part II explored what it’s like to be an employee of Conti’s sprawling organization. Today’s Part III looks at how Conti abused a panoply of popular commercial security services to…