A few weeks ago I was interested in a YouTube video about a highly accurate time card for PCs that would give better performance for the machines and could be used to enhance security. Just in time! – Octagon Technology Very accurate time is important for many security protocols and …
You can take all the defensive steps you can think of then there is a Zero-Day!
A zero-day attack refers to the gap between the “secret” launch of a cyber attack and the subsequent discovery of the attack and mitigation being available. In this gap your defences have not yet been updated because your security vendor is unaware there is problem. Your systems a laid bare …
Continue reading “You can take all the defensive steps you can think of then there is a Zero-Day!”
National Cyber Security Centre Threat Report
Weekly Threat Report – NCSC.GOV.UK
Fighting ransomware is more complicated than it first seems
Bruce Schneier has highlighted the range of conflicting choices that have to be made when combating organised cyber attacks: FBI Had the REvil Decryption Key
The SolarWinds breach – a write up
SolarWinds and the Holiday Bear Campaign: A Case Study for the Classroom – Lawfare (lawfareblog.com) This is a considered and well researched article by Professor in Law Bobby Chesney, looking at the how and why of the much publicised and far reaching SolarWinds security breach and subsequent attacks on their …