All Posts

“Bad” Security Practices That Really Aren’t All that Bad

If they can find flaws, security professionals are quick to label it as bad security behavior. But often, what is marked as “bad” may have…

Cybersecurity News: Cyberattack hits Albania, Speculative execution not patched, DARPA studies open-source

Albania hit with cyberattack Albania’s National Agency of Information Society said it was forced to temporarily close access to online public services and government website…

Seven Explanations for the Need to Secure Third-Party Integrations

It’s hard to truly explain the importance third-party applications have on our security. But, Alon Jackson, co-founder and CEO, Astrix Security does it deftly. In…

Cybersecurity News: Towns paying for remote workers, CISA orders agency patch, PLC software delivers Sality

Dozens of cities and towns are paying tech workers to abandon Silicon Valley A growing number of cities and towns all over the U.S. are…

Week in Review: Microsoft phishing warning, Callback phishing scams, Log4J forever

This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Carla Sweeney, VP Information Security Red…

Cybersecurity News: C.I.A. Vault 7 engineer convicted, Hackers targeted Jan 6 journalists, Twitter’s brief outage

Ex-C.I.A. engineer convicted in biggest theft ever of Agency secrets A former Central Intelligence Agency software engineer was convicted by a federal jury on Wednesday…

How Can You Tell If Your Security Program Is Improving?

What’s your best indicator that your security program is actually improving? And besides you and your team, is anyone impressed? Check out this post for the discussion…

Cybersecurity News: Massive phishing operation, 3 million downloadAndroid malware gets millions of downloads, Spectre-like x86 attack

Microsoft warns of massive phishing operation The company warned of a massive series of phishing attacks targeting over 10,000 organizations since September 2021. These attacks…

[7-29-22] “Hacking Current Events” – Super Cyber Friday

Please join us on Friday, July 29th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Current Events: An hour of critical…

Best moments from “Hacking Security Reporting”

Here is a six minute video full of great moments from “Hacking Security Reporting: An hour of critical thinking about producing, reading, responding, and repeating…

Cybersecurity News: FTC anonymization crackdown, TikTok privacy change, gov’t contractor pays $9 million

FTC is cracking down on false claims of anonymizing data On Tuesday, the FTC warned tech companies against making deceptive data-anonymization claims. The FTC is…

How Many Forms of ID Do I Need to Buy This Gift Card?

Getting someone to purchase gift cards is a popular vector for theft. Given that the gift card theft technique is so well known, many online…

Cybersecurity News: Experian logins dangerous, NSO deal off

French telco struggling after ransomware attack On July 4th, a ransomware group hit the French telco La Poste Mobile. While service remains available, the most…

7 Explanations of Security Compliance in Just 90 Seconds

Do you find explaining compliance to others a tad confusing? Then you MUST watch this video of Dr. Heather Buker, global CTO, 6clicks deftly take…

Cybersecurity News: China censors 1B hack, Pentagon’s bug bounty, Tech hiring cools

China tries to censor what could be biggest data hack in history Chinese censors are working overtime to clamp down on news that the data…

Cybersecurity News – Week in Review – July 4-8, 2022

Cyber Security Headlines – Week in Review – July 4-8, 2022   This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted…

Cybersecurity News: Cisco, Fortinet patches, RCMP snoops, IDEs can launch attacks

Cisco and Fortinet release security patches for multiple products Cisco on Wednesday rolled out patches for 10 security flaws spanning multiple products, one of which…

How Can We Improve Recruiting of CISOs and Security Leaders?

Interviewing for leadership positions in cybersecurity is difficult for everyone involved. There are far too many egos and many gatekeepers. What can be done to…

Cybersecurity News – Rise of Brute Ratel, cyberattacks hitting law enforcement, Apple lockdown mode

Attackers moving off Cobalt Strike Cracked versions of the Cobalt Strike attack toolkit have become a staple of threat actors’ arsenal over the years, letting…

What Is Your Third-Party App Doing to My App?

Do we know what third party apps are doing? Why is their behavior kind of a black box? Data goes in and who knows what’s…

Cybersecurity News – Hack affects 1 billion people, phishing gang takedown, NIST quantum-proof algorithms

Hacker claims to have stolen personal data of 1 billion Chinese citizens Last week, an individual using the alias ‘ChinaDan’ posted on a hacker forum…

Why Does Your Privacy Matter If I’m Paying You?

Should you monitor your staff? I mean reallymonitor them. Some bosses are installing screen grabbing and click tracking software to monitor employees and by most…

Cybersecurity News – Jenkins’ 0-day bugs, HackerOne employee sells bugs, preventable issues lead Q1 attacks

Jenkins discloses dozens of zero-day bugs in multiple plugins On Thursday, the Jenkins security team announced 34 security vulnerabilities affecting 29 plugins for the Jenkins…

Cybersecurity News – New SOHO router malware, employees use prohibited apps, Google battles bots

A new sophisticated malware is attacking SOHO routers An unusually advanced hacking group has spent almost two years infecting a wide range of small office/home…