All Posts

Roles to Prepare You to Be a CISO

One day you want to be a CISO. What area of security you begin your studies? Or maybe you shouldn’t be studying security. Check out…

Cybersecurity News: Nobelium’s MagicWeb, pro-Western influence campaigns, $100 million in NFTs stolen

Microsoft reveals Nobelium’s MagicWeb Security researchers at the company discovered a technique used by the Russian-linked threat group to maintain persistent access to compromised networks.…

“Hacking Cyber Risk Management” – Super Cyber Friday

Please join us on Friday September 9th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Cyber Risk Management: An hour of…

Cybersecurity News: Twitter ex-security chief whistleblower, Ukraine and Poland join forces, Binance deepfake scam

Ex-security chief accuses Twitter of cybersecurity negligence Peiter Zatko,Twitter’s ex-security chief who was fired back in January 2022, has blown the whistle on Twitter’s cybersecurity…

It’s OK to Look Like a Cyber Hero. Just Don’t Act Like One.

Security professionals should turn in the cyber hero mentality for the “sidekick” role. Many cybersecurity leaders believe they need to save the company from all…

Cybersecurity News: State-backed attacks not insured, LockBit hit with DDoS, Cozy Bear gets around MFA

State-backed attacks excluded from cyber insurance The insurance marketplace Lloyd’s of Lond will introduce exclusions for cyber insurance policies to not cover “catastrophic” state-backed attacks.…

Cybersecurity News: Urgent iPhone update, ZIP password fault, Hacking decommissioned satellites

iPhone users urged to update to patch 2 zero-days Apple is urging macOS, iPhone and iPad users to immediately install updates this week that includes…

Cybersecurity News Week in Review: Ukraine at Black Hat, Starlink hacked, cybersecurity workforce inequity

This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Stephen Harrison, VP Cyber Defense, MGM…

Cybersecurity News: Google blocks DDoS, Moore leaves Cyber Command, BlackByte’s ransomware options

Google blocks largest HTTPS DDoS attack ‘reported to date’ A Google Cloud Armor customer was hit with a 69-minute long distributed denial-of-service (DDoS) attack over…

Minimizing Damage from a Breach

What can we do to reduce the damage of a breach and the duration of detection and remediation? Check out this post for the discussions…

Cybersecurity News: PyPi backdoors, Project Sugarush, Redalpha phishing

PyPi packages turn installed apps to backdoors Security researchers at Snyk discovered a dozen malicious packages in the Python Package Index that could turn a…

Cybersecurity News: Oracle audits TikTok, Digital Ocean dumps Mailchimp, Twilio targets Signal

Oracle begins auditing TikTok’s algorithms The vetting of TikTok’s algorithms and content moderation models are to ensure they aren’t being manipulated by Chinese authorities, Axios…

How to Market “Zero Trust” Without Making CISOs Cringe

Just the words “zero trust” often causes security professionals to shiver. In general, CISOs are on board with the concepts of “zero trust,” we just…

Cybersecurity News: Chat app backdoor, PyPi cryptominer, corporate access prices drop

Chat app used as a backdoor Two different security reports came out over the weekend, details how the threat actor Luckymouse, also known as APT27,…

Cybersecurity News: Ukraine cyber chief Black Hat visit, Lockheed Martin breach?, $25 Starlink hack

Ukraine’s cyber chief makes surprise visit to Black Hat Ukraine’s lead cybersecurity official, Victor Zhora, made an unannounced visit to Black Hat in Las Vegas…

Week in Review: Emergency Alert flaws, Twilio confirms hack, Rebuild CISA – Krebs

This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Jack Kufahl, CISO, Michigan Medicine Cyber…

Cybersecurity News: Cisco’s Lapsus$ breach, Rebuild CISA – Krebs, ransomware BEC epidemic

Cisco admits corporate network compromised by gang with links to Lapsus$ Cisco disclosed this fact on Wednesday, stating that an employee’s personal Google account had…

We’re All Still Learning Cyber

Learning cyber is not a question for those who are just starting out. It’s for everybody. Where and how do we learn at every stage…

Cybersecurity News: Open Cybersecurity Schema Framework launches, Intel SGX flaw, CISA adds DogWalk to patch list

Introducing the Open Cybersecurity Schema Framework At Black Hat, Amazon Web Services, IBM, Cloudflare, Splunk, Palo Alto Networks, Okta, CrowdStike, and several other cybersecurity companies…

“Hacking the Brilliant Jerk” – Super Cyber Friday

Please join us on Friday, August 26th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking the Brilliant Jerk: An hour of…

Cybersecurity News: Chinese kids defrauded, Twitter Saudi spy, Facebook abortion court order

Chinese fraudsters target kids playing online games Chinese scammers are targeting children playing online games with fraudulent promises, including circumventing the nation’s 3-hour-per-week gaming limit.…

When Good Decisions Go Bad

You can make the right decision given the information you have, but everything is a risk, so there are times those good decisions are going…

Cybersecurity News: Tornado Cash sanctioned, Twilio hacked, Chinese group using simultaneous backdoors

Treasury sanctions Tornado Cash The Office of Foreign Assets Control issued the sanctions against the popular virtual currency mixer. Tornado Cash combines various types of…

Cybersecurity News: Emergency Alert flaws, Kaspersky VPN bug, “pick Fick Quick!”

Critical flaws found in US Emergency Alert System The US government is warning of critical vulnerabilities in its Emergency Alert System (EAS) that, if exploited,…