All Posts

[10-14-22] “Hacking Data Protection” – Super Cyber Friday

Please join us on Friday, October 14th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Data Protection: An hour of critical thinking…

Cybersecurity News: Lazarus targets macOS, Geopolitical DDoS, Meta takes down influence networks

Lazarus Group targets macOS users We’ve seen a number of threat groups use the surging job market as a perfect vector for cyber attacks. The…

I Pity the Fool Who Builds a Homogeneous Cyber A-Team

If you want to build a successful cybersecurity team, you need to be diverse, mostly in thought. But that diversity in thought usually is the…

Cybersecurity News: Jamf buys ZecOps, porn phishing DDoS, Cloudflare Zero Trust SIM

Jamf buys ZecOps The Apple in the enterprise world just got a little deeper, with Apple MDM stalwart Jamf acquiring ZecOps. This will add advanced…

WOW! Four Years of CISO Series

Four years ago I launched the CISO Series. At the time, we had only one show. Today, we’ve got five shows, with plans for a…

Cybersecurity News: Uber hacker arrested, Microsoft SQL hacked, CircleCI GitHub hack

London Police arrest 17-year-old hacker suspected of Uber and GTA 6 breaches The City of London Police on Friday revealed that it has arrested a…

Cybersecurity News Week in Review: Uber and Twitter hacks, MFA exploits, US Counterintelligence weaknesses

This week’s Cyber Security Headlines – Week in Review, September 19-23, is hosted by Rich Stroffolino with our guest, Joseph Lewis, Director, Cyber Assessment Strategy,…

Cybersecurity News: MFA fatigue hacking, Senate blasts counterintelligence, Australian telco breach

MFA Fatigue: Hackers’ new favorite tactic in high-profile breaches With the advent of multi-factor authentication, especially through employees’ smartphones, it was inevitable that a hack…

How to Build a Greenfield Security Program

You’re starting a security program from scratch and you’re trying to figure out where to start, what to prioritize, and how to architect it so…

Cybersecurity News: 15-year old Python bug, LinkedIn Smart Link phishing, US military using Augury

15-year old Python bug causing problem Back in 2007, a researcher submitted a path traversal bug in Python’s tarfile package, letting an attacker overwrite arbitrary…

“Hacking Cloud Security Innovation” – Super Cyber Friday

Please join us on Friday October 7th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Cloud Security Innovation: An hour of…

Is It Possible to Have One Policy to Rule Both On-Prem and Cloud Environments?

There has been endless debate and confusion around releasing and managing hybrid environments (on-prem and cloud). I spoke to Madhura Kumar, product management, director, and…

Cybersecurity News: American Airlines hacked, $160M swiped from Wintermute, 2K and Rockstar victimized by cyberattacks

American Airlines announce breach of customer and staff info On Tuesday, American Airlines indicated that “a very small number of customers’ and employees’ personal information”…

The Cybersecurity Hamster Wheel of Getting Nothing Done

What are signs your team is getting burnt out? It’s not an imbalance of work and family, it’s feeling you’re having no impact. That you’re…

Cybersecurity News: Chromeloader evolves, ransomware falls, US reviews social media campaigns

The shifting ways of Chromeloader Microsoft and VMware warned of an ongoing malware campaign using Chromeloader. Researchers observed this dropping malicious browser extensions, node-WebKit malware,…

Phishing is Not an Email Issue. It’s an ‘Anywhere I Can Message You’ Problem.

Getting people to do what they shouldn’t do is the goal of phishing. And it can happen on what is perceived to be trusted platforms…

Cybersecurity News: Uber downplays breach, LastPass downplays hack, Netgear router vulnerability

Uber says there is no evidence that users’ private information was compromised Uber has provided an update regarding the recent security breach of its internal…

Cybersecurity News Week in Review: Intermittent encryption, open source regulation, herd mentality phishing

This week’s Cyber Security Headlines – Week in Review, September 12 – 16, 2022 is hosted by Rich Stroffolino with our guest, Quincy Castro, CISO,…

Cybersecurity News: Gamers targeted on YouTube, Biden supply chain order, Queen Elizabeth II phishing scam

Gamers targeted by self-spreading stealer on YouTube On Thursday, researchers from Kaspersky published details of a new campaign leveraging RedLine malware to target YouTube users.…

Managing the Onslaught of Files

Files are still the core of how people do business. How are you dealing with the onslaught of files coming into your network? People are…

Cybersecurity News: Teams leaks tokens, cyberscammer human trafficking, Treasury Tornado Cash guidance

Teams stores tokens in cleartext A security researcher at the firm Vectra released a report detailing how the Microsoft app stores authentication tokens in cleartext.…

Cybersecurity News: Apple’s second zero-day, heat beats tweets, herd mentality phishing

Apple Releases iOS and macOS updates to patch actively exploited zero-day flaw Apple has released another round of security updates to address multiple vulnerabilities in…

09-22-22: Join Our Live Audience Recording of CISO Series Podcast in Santa Monica, CA

ISSA-LA will be hosting me at their annual ISSA-LA Information Security Summit XII. Come to this fun event where Spark will be joined by Steve…

09-20-22: Join Our Live Audience Recording of CISO Series Podcast in Mountain View, CA

We did it before the pandemic and it’s now time to do it again. ISSA Silicon Valley and San Francisco will be hosting David Spark,…