I have published an article over on our online training site, CyberAwake, that looks at how businesses can leak what appears to be insignificant information, that a hacker can collect and assemble into a picture that can comprise your cyber security: The Basics of Cyber Security – A quick look …
CISA adds a Google vulnerability to the Known Exploited Vulnerabilities Catalog and Cuba Ransomware
The US government Cybersecurity and Infrastructure Security Agency (CISA) has added a Google vulnerability to its Known Exploited Vulnerabilities Catalog. CISA Adds One Known Exploited Vulnerability to Catalog | CISA CISA also published a detailed advisory last week examining all aspects of the Cuba Ransomware as part of its #StopRansomware …
DuckLogs MaaS enables low skill hackers
Anyone in business today and having anything to do with technology is very familiar with the acronym something-aaS – as-a-service. For smaller businesses it means we can access tools, systems and expertise that once were only available to businesses with the budget, infrastructure and pockets to support them. So we …
Cracking Ransomware Encryption
You should not rely on the technique in this article as your “ransomware recovery plan”: Researchers Quietly Cracked Zeppelin Ransomware Keys – Krebs on Security If you read the article, you can see that breaking the ransomware encryption is not easy or guaranteed. Neither should you plan on paying up: …
Car security again
This is proving to be a fertile ground for cyber security researchers. I wonder, how many dissertations this continual issue is going to generate? One of the under lying issue here is technology being pushed beyond what it was originally designed for and lacking the underlying high security the applications …
