Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Bruce Schneier Edition


Excellent Write-up of the SolarWinds Security Breach

[2021.08.30] Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.

This one is a must read.


Surveillance of the Internet Backbone

[2021.08.25] Vice has an article about how ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

Original release date: July 19, 2021

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques and the D3FEND framework for referenced defensive tactics ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Windows 11: Understanding the system requirements and the security benefits

Security is a big part of Windows 11, but so is delivering productivity and a good experience with all the security features turned on.


Kaseya VSA Supply-Chain Ransomware Attack

Original release date: July 2, 2021

CISA is taking action to understand and address the recent supply-chain ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Yes, There Really Is A Windows 11

Microsoft announces Windows 11, with a new design, Start menu, and more. A new version of Windows is officially on the way.


Urgent Alert –  WD My Book Live users wake up to find their data deleted

Storage-device maker advises customers to unplug My Book Lives ...

Continue Reading →
0

Guest Post – What exactly does “code obfuscation” imply?

Code obfuscation is the process of modifying an executable so that it is no longer valuable to a hacker while remaining fully functioning. Although the procedure may alter method instructions or metadata, it has no impact on the program’s output. To be clear, practically any code can be reverse-engineered with enough time and effort. On a number of ...

Continue Reading →
0

Guest Post – Why Supply Chain Cybersecurity Should Be A Business Priority

When people think of cyber security, we all think of data security. Whether you are hiring professionals or providing physical goods and services, the security of your employees’, applicants’, and customers’ data is of utmost importance. And with more devices and people getting connected, security breaches are becoming more prevalent. 

Hackers usually want one thing: money. They take your data and hold that hostage in exchange for money, or at ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


NASA’s Perseverance Rover Lands on Mars

The technically complex landing marks the fifth successful U.S. bid to reach the Martian surface


Its Not Just SolarWinds: France Reveals Three-Year Long Supply Chain Attack

News of the SolarWinds data breach, where its software management updates were hacked, rocked the cyber world. And now comes news ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Trump Campaign Site Hacked – What We Know & Lessons Learned

This entry was posted on October 27, 2020 by Mark Maunder

On October 27, 2020 at approximately 4:50pm Mountain Time, Donald Trump’s campaign website, www.donaldjtrump.com, was defaced. The attackers left a message claiming they had compromising information on President Trump. The ...

Continue Reading →
0
Page 1 of 14 12345...»