crypto-currency

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


ZuoRAT Hijacks SOHO Routers To Silently Stalk Networks

Executive Summary

The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter — devices which are routinely purchased by consumers but rarely monitored or patched — small office/home ...

Continue Reading →
0

Technological Trends That Will Define This Decade

The world of technology has changed beyond description in the previous decade. Consider the start of the year 2009. You grew up before the iPad, Uber, and even Instagram. Fitness trackers were, in essence, pedometers. “If the smartphone looks to be more of a slow mobile, hang in there,” Wired encouraged consumers in 2010. The fourth ...

Continue Reading →
1

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Collaboration Solves the Cyber Risk to Business Risk Challenge

[Bob’s comment:  If you have taken a CISSP or other cybersecurity class from me, you already know that the CIS 20 Controls are my favorite cybersecurity framework.  Here is a new set of tools for doing a risk assessment based on the 20 Controls.]

Over the past year, the ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Broadcom Software Discloses APT Actors Deploying Daxin Malware in Global Espionage Campaign

Original release date: February 28, 2022

Broadcom Software—an industry member of CISA’s Joint Cyber Defense Collaborative (JCDC)—uncovers an advanced persistent threat (APT) campaign against select governments and other critical infrastructure targets in a publication titled Daxin: Stealthy Backdoor Designed ...

Continue Reading →
0
Page 1 of 4 1234