All Posts

Cybersecurity News: PowerDrop targets Defense, YKK zipper attacked, Barracuda urges replacement

New PowerDrop malware targets U.S. aerospace defense industry Researchers from the Adlumin Threat Research group warn that the PowerShell-based malware uses advanced techniques to evade…

How Should We Trust Entry Level Employees?

All experienced security professionals were at one time very green. Entry level status means risk to your organization. That’s if you give them too much…

Cybersecurity News: Google email authentication, SEC data breaches, Clop asks victims to email

Google improves brand email authentication  Brand impersonation with email is a tail as old as time. Last month, Google thought it cracked the nut with…

Pay Per Use, Not Pay Per Seat

“The open source project (of OpenVPN) as good as it is, does not meet the needs of most businesses,” said Rohit Kalbag, vp of product…

Cybersecurity News: Microsoft $20M COPPA settlement, Hactivists take credit for Outlook.com outages, SEC sues Coinbase

Microsoft to pay $20M settlement for illegally collecting children’s data Microsoft will pay $20 million to settle charges brought by the Federal Trade Commission for…

Your Lips Say “No,” But I’m Not Listening

There is a long history of security professionals complaining about the insecurity of new technologies. When new technologies take off, they rarely have lots of…

Cybersecurity News: Satellite hacking, Atomic Wallet breach, SEC sues Binance

Satellite hacking at DEF CON Earlier this week, a SpaceX rocket carried the Moonlighter satellite into space and will soon be in orbit. The Aerospace…

Data Classification Is the Key to Your Data Security Efforts

Why is data classification such a critical keystone? “It helps you quantify where your risk is”, said Matt Radolec, sr. director incident response and cloud…

Cybersecurity News: Switzerland Xplain attack, BlackSuit resembles Royal, Microsoft retires Cortana

Xplain hack impacts Swiss cantonal police and Fedpol Swiss police are investigating a cyberattack that impacted the IT service provider Xplain, which provides services to…

[06-19-23] CISO Series Podcast Live in Tel Aviv

We’ll be kicking off the CISO Summit TLV 2023, a six day event, with a live audience recording of CISO Series Podcast. This is a…

Cybersecurity News Week in Review: Amazon Ring privacy violations, Gigabyte firmware problems, AI extinction threat

This week’s Cyber Security Headlines – Week in Review, May 29-June 2, is hosted by Sean Kelly with our guest, Howard Holton, CTO, GigaOm Cyber…

Cybersecurity News: Amazon Ring privacy violations, Kaspersky triangulation APT, Cybercommand Hartman

Amazon Ring, Alexa accused of privacy violations by FTC America’s Federal Trade Commission on Wednesday charged, via the US Dept of Justice, two Amazon outfits…

How Must Processes Change to Reduce Risk?

What do we need to do to fix our processes to truly reduce risk and vulnerabilities? Check out this post for the discussion that is…

Cybersecurity News: More Toyota leaks, Gigabyte firmware issues, Twitter Community Notes for images

Toyota finds more cloud leaks Earlier this year, Toyota disclosed that misconfigured servers resulted in it exposing location data on over two million customers for…

Cybersecurity News: Experts warn of extinction from AI, Hackers demand $3 million from Scandinavian Airlines, Theranos founder surrenders to 11-year prison term

Leading experts warn of a risk of extinction from AI On Tuesday, AI experts issued a dire warning saying, “Mitigating the risk of extinction from…

Failure Is The Likely Option

When cybersecurity needs to cut budget, first move is to look where you have redundancy. That way you’re not actually reducing the security effort. But…

Cybersecurity News: GobRAT targets Linux, RPMSG messages exploited, Augusta Georgia cyberattack

New GobRAT remote access trojan targeting Linux routers in Japan This is a new Golang remote access trojan (RAT) called GobRAT. “Initially, the attacker targets…

Cybersecurity News Week in Review: Industrial infrastructure threat,  BEC attempts on the rise, TikTok’s Texas progress

Cyber Security Headlines – Week in Review, May 22-26, is hosted by Rich Stroffolino with our guest, Rich Greenberg, ISSA Distinguished Fellow and Honor Roll,…

Cybersecurity News:  GDPR turns 5, GitLab patches vulnerability, Russian industrial malware

GDPR is 5 years old, and over 1 million people have asked to be forgotten On the 5th birthday of GDPR, a new study from…

Reputational Damage from Breaches

Security professionals talk a lot about the reputational damage from breaches. And it seems logical, but major companies still do get breached and their reputation…

Cybersecurity News: Google launches GUAC, Barracuda zero-day, campaign targets Kenyan debt

Google launches GUAC Back in October, Google announced a new open source initiative called Graph for Understanding Artifact Composition, or GUAC, in an effort to…

“Hacking Data Loss” – Super Cyber Friday

Please join us on Friday June 9th, 2023 for Super Cyber Friday. Our topic of discussion will be “Hacking Data Loss: An hour of critical…

PREVIEW: CISO Series Podcast LIVE in Denver 6-7-23

Here’s a preview video of the live audience recording of the CISO Series Podcast at the Rocky Mountain Information Security Conference (RMISC) in Denver. Joining…

Cybersecurity News: TikTok sues Montana, US sanctions North Korea’s ‘illicit’ IT army orgs, Fake images on Twitter spook stock market

TikTok sues Montana after state bans app On Monday, TikTok Inc filed a lawsuit challenging the state of Montana’s new ban on use of the…