Derek Krein
- 68 Posts
Cyber Threat Weekly – #65
The week of February 10th through February 16th, around 380 cyber news articles were reviewed. A light-ish amount of cyber threat trends and adversarial behavior news to share. Been thinkin about proactive defense with deception technology. Low / no buck deception pays huge dividends. As an industry, we struggle to detect
Cyber Threat Weekly – #64
The week of February 3rd through February 9th, around 382 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share. Been thinkin, proactive security is a necessity in today’s threat landscape. The Threat Informed Defense Cycle has three dimensions: 1. Know
Cyber Threat Weekly – #63
The week of January 27th through February 2nd, around 416 cyber news articles were reviewed. A moderate amount of cyber threat trends and adversarial behavior news to share. Been thinkin, complexity is the enemy of security. How do we take a step back, consolidate, automate, and simplify our security programs?
Cyber Threat Weekly – #62
The week of January 20th through January 26th, around 369 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share. Fundamentals performed with excellence wins championships. In the case of cybersecurity, fundamentals performed with excellence can minimize organizational impact from cyber-attacks. Simplicity
Cyber Threat Weekly – #61
The week of January 13th through January 19th, roughly 408 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share. Let’s start with researchers find a NTLMv1 bypass tactic. Fortinet auth bypass bug and threat actors dump Fortinet config data. Typosquatting
Cyber Threat Weekly – #60
The week of January 6th through January 12th, roughly 358 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share. This week it looks like it’s mostly social engineering behavior to report. Let’s start with taking advantage of the familiar,
Cyber Threat Weekly – #59
The week of December 30th through January 5th, roughly 169 cyber news articles were reviewed. A very light amount of cyber threat trends and adversarial behavior news to share. Let’s start with a new Android malware called FireScam. Phishing and SEO poisoning delivers PLAYFULGHOST. Crash Windows servers with LDAPNightmare.
Cyber Threat Weekly – #58
The week of December 23rd through December 29th, roughly 148 cyber news articles were reviewed. A light amount of cyber threat trends and adversarial behavior news to share. Let’s start with a ninth US telecom breach linked to Chinese APT. Palo Alto Networks (PAN) firewall denial of service (DoS)
Cyber Threat Weekly – #57
The week of December 16th through December 22nd, around 326 cyber news articles were reviewed. A moderate amount of cyber threat trend and adversarial behavior news to share. Let’s start with $2.2 billion in Cryptocurrency stolen in 2024. New Phishing-as-a-Service (PHaaS) on the rise. Obfuscating Malicious JavaScript using
Cyber Threat Weekly – #56
The week of December 9th through December 15th, about 348 cyber news articles were reviewed. Only a light amount of cyber threat trend and adversarial behavior news to share. Let’s start with HeartCrypt – Packer-as-a-Service (PaaS). Citrix NetScaler / NetScaler Gateway under brute force attack. Covert Linux multi-stage rootkit attack. New