All posts by jb

Defensive Security Podcast Episode 126

http://fortune.com/2015/07/29/crowdstrike-cybersecurity-george-kurtz/

http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/phishing-up-74-in-q2-2015-reveals-infoblox-dns-threat-index/

http://blog.trendmicro.com/trendlabs-security-intelligence/angler-exploit-kit-used-to-find-and-infect-pos-systems/

http://www.welivesecurity.com/2015/07/28/new-report-explains-gulf-security-experts-non-experts/

Defensive Security Podcast Episode 125

http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/

http://www.mcafee.com/us/resources/reports/rp-aspen-holding-line-cyberthreats.pdf

http://arstechnica.com/tech-policy/2015/07/obama-administration-decides-not-to-blame-china-publicly-for-opm-hack/

http://blog.trendmicro.com/trendlabs-security-intelligence/hacking-team-rcsandroid-spying-tool-listens-to-calls-roots-devices-to-get-in/

Defensive Security Podcast Episode 124

http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/

http://arstechnica.com/security/2015/07/hackingteams-evil-android-app-had-code-to-bypass-google-play-screening/

http://www.scmagazine.com/ios-devices-dont-have-to-be-jailbroken-for-spyware-sold-by-hacking-team-to-be-installed/article/426137/

https://krebsonsecurity.com/2015/07/hacking-team-used-spammer-tricks-to-resurrect-spy-network/

http://www.scmagazine.com/fireeye-intern-morgan-culbertson-arrested-in-darkode-bust/article/427139/2/

http://erpscan.com/wp-content/themes/supercms/Publications/Chinese_attack_on_USIS_using_SAP_vulnerability_Detailed_review_and_comments.pdf

Defensive Security Podcast Episode 123

http://labs.bromium.com/2015/07/10/government-grade-malware-a-look-at-hackingteams-rat/
http://www.theregister.co.uk/2015/07/12/adobe_flash_zero_day_cve_2015_5122/
https://www.tenable.com/blog/lessons-to-learn-from-the-opm-breach
http://arstechnica.com/tech-policy/2015/07/opm-director-resigns-after-news-that-hack-affected-21-5-million-people/
http://www.ffiec.gov/cyberassessmenttool.htm

Defensive Security Podcast Episode 122

http://arstechnica.com/security/2015/07/massive-leak-reveals-hacking-teams-most-private-moments-in-messy-detail/ & http://www.csoonline.com/article/2945200/vulnerabilities/adobe-to-patch-flash-0-day-created-by-hacking-team.html
http://securityaffairs.co/wordpress/38372/cyber-crime/kins-malware-builder-leaked.html

Cyber UL Could Become Reality Under Leadership of Hacker Mudge


http://www.federaltimes.com/story/government/omr/opm-cyber-report/2015/06/23/keypoint-usis-opm-breach/28977277/

Defensive Security Podcast Episode 121

http://www.databreaches.net/fbi-cyber-division-bulletin-on-tools-reportedly-used-by-opm-hackers/
https://fortune.com/sony-hack-part-1/
http://www.csoonline.com/article/2938310/data-protection/lieberman-mandiant-and-verizon-wrong-on-unstoppable-threats.html
http://www.itworld.com/article/2939255/windows/the-us-navys-warfare-systems-command-just-paid-millions-to-stay-on-windows-xp.html

Defensive Security Podcast Episode 120

http://www.bankinfosecurity.com/blogs/did-fisma-facilitate-opm-hack-p-1879/op-1

http://www.csoonline.com/article/2936723/data-breach/user-error-is-an-expected-business-problem.html

http://www.databreachtoday.com/blogs/post-malware-outbreak-rip-replace-p-1877

http://www.csoonline.com/article/2936615/data-breach/6-breaches-lessons-reminders-and-potential-ways-to-prevent-them.html

http://www.nytimes.com/2015/06/17/sports/baseball/st-louis-cardinals-hack-astros-fbi.html

Defensive Security Podcast Episode 119

http://www.theregister.co.uk/2015/05/28/cottage_healthcare_system_sued/
http://arstechnica.com/security/2015/06/report-hack-of-government-employee-records-discovered-by-product-demo/

What I know about US Export Controls and Hacking Tools
byu/4d004anonymous innetsec


http://www.bis.doc.gov/index.php/policy-guidance/faqs
http://www.wired.com/2015/06/kaspersky-finds-new-nation-state-attack-network/

Defensive Security Podcast Episode 118

http://www.symantec.com/connect/fr/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information

https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/

http://krebsonsecurity.com/2015/05/carefirst-blue-cross-breach-hits-1-1m/

http://www.forbes.com/sites/thomasbrewster/2015/05/20/guns-bombs-hacking-cars-and-planes-dangerous-tweets-for-a-security-researcher/