Skip to content

Derek Krein

Members Public

Cyber Threat Weekly – #65

The week of February 10th through February 16th, around 380 cyber news articles were reviewed.  A light-ish amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about proactive defense with deception technology. Low / no buck deception pays huge dividends.  As an industry, we struggle to detect

Members Public

Cyber Threat Weekly – #64

The week of February 3rd through February 9th, around 382 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Been thinkin, proactive security is a necessity in today’s threat landscape.  The Threat Informed Defense Cycle has three dimensions: 1.    Know

Members Public

Cyber Threat Weekly – #63

The week of January 27th through February 2nd, around 416 cyber news articles were reviewed.  A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin, complexity is the enemy of security. How do we take a step back, consolidate, automate, and simplify our security programs?

Members Public

Cyber Threat Weekly – #62

The week of January 20th through January 26th, around 369 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Fundamentals performed with excellence wins championships.  In the case of cybersecurity, fundamentals performed with excellence can minimize organizational impact from cyber-attacks.  Simplicity

Members Public

Cyber Threat Weekly – #61

The week of January 13th through January 19th, roughly 408 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Let’s start with researchers find a NTLMv1 bypass tactic. Fortinet auth bypass bug and threat actors dump Fortinet config data.  Typosquatting

Members Public

Cyber Threat Weekly – #60

The week of January 6th through January 12th, roughly 358 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  This week it looks like it’s mostly social engineering behavior to report.  Let’s start with taking advantage of the familiar,

Members Public

Cyber Threat Weekly – #59

The week of December 30th through January 5th, roughly 169 cyber news articles were reviewed.  A very light amount of cyber threat trends and adversarial behavior news to share.  Let’s start with a new Android malware called FireScam. Phishing and SEO poisoning delivers PLAYFULGHOST.  Crash Windows servers with LDAPNightmare.

Members Public

Cyber Threat Weekly – #58

The week of December 23rd through December 29th, roughly 148 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Let’s start with a ninth US telecom breach linked to Chinese APT. Palo Alto Networks (PAN) firewall denial of service (DoS)

Members Public

Cyber Threat Weekly – #57

The week of December 16th through December 22nd, around 326 cyber news articles were reviewed.  A moderate amount of cyber threat trend and adversarial behavior news to share.  Let’s start with $2.2 billion in Cryptocurrency stolen in 2024. New Phishing-as-a-Service (PHaaS) on the rise.  Obfuscating Malicious JavaScript using

Members Public

Cyber Threat Weekly – #56

The week of December 9th through December 15th, about 348 cyber news articles were reviewed.  Only a light amount of cyber threat trend and adversarial behavior news to share.  Let’s start with HeartCrypt – Packer-as-a-Service (PaaS). Citrix NetScaler / NetScaler Gateway under brute force attack.  Covert Linux multi-stage rootkit attack.  New