Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

Original release date: July 19, 2021

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques and the D3FEND framework for referenced defensive tactics ...

Continue Reading →
0

Friday Phish Fry

And Sys Admin Appreciation Day!!

Phishing Email Alerts

Catch of the Day: IONOS Email Validation Phish

Chef’s Special:  HR and Security Phish Attacks

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.

Many of these articles are from Bruce Schneier’s blog


New edition of The Internet Protocol Journal available for download

I’ve been reading this journal since 2002.  If you are into networking, this is a must read, and is free of charge and free of advertising.


CISA Insights: Guidance for MSPs and Small- ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Microsoft Invoice Phish

Chef’s Special:  Home Delivery Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, ...

Continue Reading →
0

Popular Marvel, DC Comics, and Star Wars Themed Passwords to Avoid

As I have been saying for years, passwords by themselves no longer represent a secure form of authentication.  This is because passwords can be easily guessed, or solved using automated password cracking techniques such as the Dictionary Attack or Brute Force Attack.  There are also pre-cracked lists of passwords called Rainbow Tables available on both the light and dark web.

There are plenty of Rainbow Table available for the most commonly ...

Continue Reading →
0
Page 5 of 216 «...34567...»