CYBER THIS WEEK – AUGUST 14, 2022


Looking Back at 25 Years of Black Hat

Black Hat helped the corporate world understand the value hackers could bring to the table by giving these creative minds a certain stamp of legitimacy. Twenty-five years after its first edition, the event has expanded to include multiple niches and geographies.

Looking Back at 25 Years of Black Hat (darkreading.com) 

Cisco Talos shares insights related to recent cyber-attack on Cisco

CISCO Talos shares insights related to the recent cyber-attack on CISCO. During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized. 

Cisco Talos Intelligence Group – Comprehensive Threat Intelligence: Cisco Talos shares insights related to recent cyber attack on Cisco

Network mistakes, misconfigurations cost companies millions

Network misconfigurations cost companies an average of 9% of annual revenues, according to a study released Wednesday by a network security and Compliance Company.

Network mistakes, misconfigurations cost companies millions | CSO Online

The Security Pros and Cons of Using Email Aliases

Aliases can help users detect breaches and fight spam. But not all websites allow aliases, and they can complicate account recovery. Here’s a look at the pros and cons of adopting a unique alias for each website.

The Security Pros and Cons of Using Email Aliases – Krebs on Security

Phishers who breached Twilio and targeted Cloudflare could easily get you, too

At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced threat actor who had possession of home phone numbers of not just employees but employees’ family members as well.

Phishers who breached Twilio and targeted Cloudflare could easily get you, too | Ars Technica

Applying the Swiss cheese model to cyber resilience

The Swiss cheese model is often used in risk analysis and risk management. It essentially likens systems to multiple slices of Swiss cheese, stacked side by side, with threat risk mitigated by the different layers and types of defenses / defences that are ‘stacked’ next to each other. The theory is that lapses and weaknesses in one defensive layer don’t allow a risk to materialize, because other defenses also exist. In other words, you can prevent a single point of failure.

Applying the Swiss cheese model to cyber resilience (continuitycentral.com)

Coalition Of Cybersecurity Leaders Launch Open Cybersecurity Schema Framework (OCSF)

The OCSF project was initiated by a partnership between Splunk and AWS, which built on the ICD Schema developed at Symantec—now part of Broadcom. There are now 15 additional members, including some of the biggest names in technology and cybersecurity

Coalition Of Cybersecurity Leaders Launch Open Cybersecurity Schema Framework (OCSF) (forbes.com)

Starlink Successfully Hacked Using $25 Modchip

A Belgian security researcher has successfully hacked the SpaceX operated Starlink satellite-based internet system using a homemade circuit board that cost around $25 to develop, he revealed at Black Hat.

Starlink Successfully Hacked Using $25 Modchip | Threatpost

Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment

Being proactive in the evolving digital ecosystem is not just about procuring technologies and hiring people. It also means adopting a cybersecurity framework that would include tactical measures, encryption, authentication, biometrics, analytics, and continuous testing, diagnostics, and mitigation, as they may apply to specific circumstances.

Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment – HS Today

This was H1 2022: Part 2 – Cyber War

This blog is the second post in a three-part series to take a thematic look at cyber activities from the first half of 2022. It reviews the cyber events leading up to and occurring as a consequence of Russian’s invasion of Ukraine — a story of modern-day cyber warfare.

This was H1 2022: Part 2 – Cyber War | Radware Blog

Share: