Day: April 8, 2022

ESW #268 – Josh Snow & Catherine Ullman

Paul’s Security Weekly Tue, 31 May 2022 22:18:06 +0000 Wed, 08 Jun 2022 08:33:28 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ production@securityweekly.net (production@securityweekly.net) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly paul@securityweekly.com hacking,security false production@securityweekly.net episodic no ESW #268 – Josh Snow & Catherine Ullman Fri, 08 Apr 2022 21:00:00 +0000 01:55:15 false Podcast full Read more

ESW #268 – Josh Snow & Catherine Ullman

Paul’s Security Weekly Tue, 31 May 2022 22:18:06 +0000 Wed, 08 Jun 2022 08:33:28 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ production@securityweekly.net (production@securityweekly.net) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly paul@securityweekly.com hacking,security false production@securityweekly.net episodic no ESW #268 – Josh Snow & Catherine Ullman Fri, 08 Apr 2022 21:00:00 +0000 01:55:15 false Podcast full Read more

SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up

Paul’s Security Weekly Tue, 31 May 2022 22:18:06 +0000 Wed, 08 Jun 2022 07:39:55 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ production@securityweekly.net (production@securityweekly.net) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly paul@securityweekly.com hacking,security false production@securityweekly.net episodic no SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up Fri, 08 Apr 2022 18:58:57 +0000 28:35 false …

SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up Read More »

SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up

Paul’s Security Weekly Tue, 31 May 2022 22:18:06 +0000 Wed, 08 Jun 2022 07:39:55 +0000 Libsyn WebEngine 2.0 http://securityweekly.com/ en http://securityweekly.com/ production@securityweekly.net (production@securityweekly.net) https://ssl-static.libsyn.com/p/assets/2/3/1/7/231716b9da792464/PSW_1400x1400.png Paul’s Security Weekly paul@securityweekly.com hacking,security false production@securityweekly.net episodic no SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up Fri, 08 Apr 2022 18:58:57 +0000 28:35 false …

SWN #202 – Microsoft, VMWare, Burnout, Android, HIMEM.SYS, Parrot, & Rants – Wrap Up Read More »

What Executives Need to Know About SpringShell (aka Spring4Shell)

SpringShell, also known as Spring4Shell, is a vulnerability in the Spring Framework, a widely used open-source framework for building enterprise Java applications.  SpringShell Explained One reason the vulnerability is considered severe is that it allows unauthenticated remote code execution – in other words, by exploiting this vulnerability, an attacker could run commands on a compromised …

What Executives Need to Know About SpringShell (aka Spring4Shell) Read More »

Overcome Security Issues Raised by Cloud Computing

If you’ve been working in InfoSec for a while, you’ve seen your fair share of security protocols and controls. First, it was on-prem hardware that, while challenging for external threats to access, required substantial manual effort to protect. Then, network-based data sharing opened up security controls to threats outside your four walls, but the security …

Overcome Security Issues Raised by Cloud Computing Read More »

Does a Faster Network Make for Safer Food?

Lauren Womack April 8th, 2022 When people talk about revolutions in agricultural history, they generally agree that the first revolution was the transition from hunting and gathering to farming. The second transformation coincided with the industrial revolution and mechanized farming while increasing farmers’ market access with faster transportation. The third revolution revolved around hybridization and …

Does a Faster Network Make for Safer Food? Read More »

Dear CISO, What’s the ROI of Our Cybersecurity Investments?

For many CISOs, “what’s the ROI from our cybersecurity tools?” is one of the most difficult questions they face during a board meeting. While it should be a simple question, it’s not easy to answer. Often CISOs may deflect and use operational security metrics, such as mean time to patch. However, operational security metrics aren’t …

Dear CISO, What’s the ROI of Our Cybersecurity Investments? Read More »

Conti pivots as ransomware as a service struggles

The Conti ransomware group —a.k.a. Wizard Spider; a.k.a. TrickBot; a.k.a Ryuk—is one of the most prolific ransomware gangs around. It is believed to have been active, in various incarnations, since about 2016. Just in the last year, Conti is believed to be responsible for high profile attacks, including the city government in Tulsa, Oklahoma and …

Conti pivots as ransomware as a service struggles Read More »

Web3 Security: Tips to Protect Yourself and Your Crypto Wallet from Hackers

The web3 environment is both centralized and decentralized because of the intersection between some centralized entities and decentralized protocols. Conversely, navigating the decentralized aspect of the web3 space requires some basic understanding of the space. The decentralization of blockchain embodied various attributes and security responsibilities and as a decentralized environment, we must step up and …

Web3 Security: Tips to Protect Yourself and Your Crypto Wallet from Hackers Read More »

WE’RE IN! Episode 15: Anonymous, Their History and Influence on Today’s Hacker Culture

By Kim Crawley The hacktivist group Anonymous recently made headlines for its declaration of a “cyber war” against Russia in response to President Vladimir Putin’s decision to invade neighboring Ukraine. This is just one of many high-profile hacks claimed by Anonymous in the past decade.  While Anonymous may be famous for their politically motivated, and …

WE’RE IN! Episode 15: Anonymous, Their History and Influence on Today’s Hacker Culture Read More »

GDPR fine: Danske Bank fined €1.3 million over non-compliant data deletion processes

On April 5, The Danish Data Protection Agency (Datatilsynet) reported Danske Bank to the police and issued a €1.3 million (DKK 10 million) fine for not being able to demonstrate a compliant data deletion process along with the violation of Art. 5 (2) GDPR. In November 2020, Datatilsynet initiated the investigation after the Bank itself …

GDPR fine: Danske Bank fined €1.3 million over non-compliant data deletion processes Read More »

Monthly Threat Actor Group Intelligence Report, January 2022 (ENG)

#top .av-special-heading.av-knywxz-07e1449a02ef1427737d314fde503927{ padding-bottom:10px; } body .av-special-heading.av-knywxz-07e1449a02ef1427737d314fde503927 .av-special-heading-tag .heading-char{ font-size:25px; } .av-special-heading.av-knywxz-07e1449a02ef1427737d314fde503927 .av-subheading{ font-size:15px; } Monthly Threat Actor Group Intelligence Report, January 2022 (ENG) This document is an overview of threat actor group activities as analyzed by NSHC ThreatRecon team, based on data and information collected since 21 December 2021 to 20 January 2022. #top .av-special-heading.av-jscl07-7d95ff2076e27f805218e05beca8ef0d{ …

Monthly Threat Actor Group Intelligence Report, January 2022 (ENG) Read More »

Explained: What is Web3.0 and Why Does it Matter?

Estimated reading time: 3 minutes The Internet, as we all know it, is approaching a crossroads. The issues it’s currently facing are associated with the centralized model of computing (top-down, data-driven, and not necessarily human-centric), during which a finite number of private entities control the information. In this blog, we have explained how Web 3.0 …

Explained: What is Web3.0 and Why Does it Matter? Read More »