CYBER THIS WEEK – AUGUST 14, 2022
Looking Back at 25 Years of Black Hat
Black Hat helped the corporate world understand the value hackers could bring to the table by giving these creative minds a certain stamp of legitimacy. Twenty-five years after its first edition, the event has expanded to include multiple niches and geographies.
Looking Back at 25 Years of Black Hat (darkreading.com)
Cisco Talos shares insights related to recent cyber-attack on Cisco
CISCO Talos shares insights related to the recent cyber-attack on CISCO. During the investigation, it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized.
Network mistakes, misconfigurations cost companies millions
Network misconfigurations cost companies an average of 9% of annual revenues, according to a study released Wednesday by a network security and Compliance Company.
Network mistakes, misconfigurations cost companies millions | CSO Online
The Security Pros and Cons of Using Email Aliases
Aliases can help users detect breaches and fight spam. But not all websites allow aliases, and they can complicate account recovery. Here’s a look at the pros and cons of adopting a unique alias for each website.
The Security Pros and Cons of Using Email Aliases – Krebs on Security
Phishers who breached Twilio and targeted Cloudflare could easily get you, too
At least two security-sensitive companies—Twilio and Cloudflare—were targeted in a phishing attack by an advanced threat actor who had possession of home phone numbers of not just employees but employees’ family members as well.
Phishers who breached Twilio and targeted Cloudflare could easily get you, too | Ars Technica
Applying the Swiss cheese model to cyber resilience
The Swiss cheese model is often used in risk analysis and risk management. It essentially likens systems to multiple slices of Swiss cheese, stacked side by side, with threat risk mitigated by the different layers and types of defenses / defences that are ‘stacked’ next to each other. The theory is that lapses and weaknesses in one defensive layer don’t allow a risk to materialize, because other defenses also exist. In other words, you can prevent a single point of failure.
Applying the Swiss cheese model to cyber resilience (continuitycentral.com)
Coalition Of Cybersecurity Leaders Launch Open Cybersecurity Schema Framework (OCSF)
The OCSF project was initiated by a partnership between Splunk and AWS, which built on the ICD Schema developed at Symantec—now part of Broadcom. There are now 15 additional members, including some of the biggest names in technology and cybersecurity
Coalition Of Cybersecurity Leaders Launch Open Cybersecurity Schema Framework (OCSF) (forbes.com)
Starlink Successfully Hacked Using $25 Modchip
A Belgian security researcher has successfully hacked the SpaceX operated Starlink satellite-based internet system using a homemade circuit board that cost around $25 to develop, he revealed at Black Hat.
Starlink Successfully Hacked Using $25 Modchip | Threatpost
Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment
Being proactive in the evolving digital ecosystem is not just about procuring technologies and hiring people. It also means adopting a cybersecurity framework that would include tactical measures, encryption, authentication, biometrics, analytics, and continuous testing, diagnostics, and mitigation, as they may apply to specific circumstances.
Why Proactive Cybersecurity Is a Must in Today’s Sophisticated Threat Environment – HS Today
This was H1 2022: Part 2 – Cyber War
This blog is the second post in a three-part series to take a thematic look at cyber activities from the first half of 2022. It reviews the cyber events leading up to and occurring as a consequence of Russian’s invasion of Ukraine — a story of modern-day cyber warfare.