All posts by jerry

Defensive Security Podcast Episode 255

https://www.reuters.com/technology/us-sec-official-says-agency-has-begun-probe-cyber-breach-by-solarwinds-2021-06-21/

https://www.databreachtoday.com/cisa-firewall-rules-could-have-blunted-solarwinds-malware-a-16919

https://www.wired.com/story/the-full-story-of-the-stunning-rsa-hack-can-finally-be-told/

https://www.bleepingcomputer.com/news/security/microsoft-admits-to-signing-rootkit-malware-in-supply-chain-fiasco/

Defensive Security Podcast Episode 253

https://www.securityinformed.com/news/intruder-research-mongodb-databases-breached-connected-internet-co-1594211095-ga-co-1594211806-ga.1594215158.html

https://www.zdnet.com/article/hackers-are-trying-to-steal-admin-passwords-from-f5-big-ip-devices/

https://www.csoonline.com/article/3564726/privilege-escalation-explained-why-these-flaws-are-so-valuable-to-hackers.html#tk.rss_all

https://arstechnica.com/information-technology/2020/06/theft-of-top-secret-cia-hacking-tools-was-result-of-woefully-lax-security/

Defensive Security Podcast Episode 252

https://www.bankinfosecurity.com/capital-one-must-turn-over-mandiant-forensics-report-a-14352

https://www.databreachtoday.com/insider-threat-lessons-from-3-incidents-a-14312

https://www.zdnet.com/article/ransomware-deploys-virtual-machines-to-hide-itself-from-antivirus-software/

Defensive Security Podcast Episode 250

https://www.zdnet.com/article/dhs-cisa-companies-are-getting-hacked-even-after-patching-pulse-secure-vpns/

https://www.bankinfosecurity.com/attackers-increasingly-using-web-shells-to-create-backdoors-a-14179

https://www.bleepingcomputer.com/news/security/doppelpaymer-ransomware-hits-los-angeles-county-city-leaks-files/

Defensive Security Podcast Episode 249

https://www.tomsguide.com/news/zoom-security-privacy-woes

https://www.bankinfosecurity.com/blogs/learn-from-how-others-get-breached-equifax-edition-p-2870

https://www.zdnet.com/article/microsoft-how-one-emotet-infection-took-out-this-organizations-entire-network/

https://www.microsoft.com/security/blog/wp-content/uploads/2020/04/Case-study_Full-Operational-Shutdown.pdf

Defensive Security Podcast Episode 248

Be well, be safe, take care of yourselves, and take care of others (from an appropriate distance).

https://www.businessinsider.com/coronavirus-apple-secrecy-work-from-home-difficult-2020-3

https://www.csoonline.com/article/3531963/8-key-security-considerations-for-protecting-remote-workers.html

https://www.zdnet.com/article/microsoft-99-9-of-compromised-accounts-did-not-use-multi-factor-authentication/

Defensive Security Podcast Episode 247

https://www.securityweek.com/state-sponsored-cyberspies-use-sophisticated-server-firewall-bypass-technique

https://www.zdnet.com/article/ransomware-victims-thought-their-backups-were-safe-they-were-wrong/

https://www.sec.gov/files/OCIE%20Cybersecurity%20and%20Resiliency%20Observations.pdf

Defensive Security Podcast Episode 246

https://www.darkreading.com/risk/cybercriminals-swap-phishing-for-credential-abuse-vuln-exploits/d/d-id/1337019

https://www.businessinsider.com/phishing-scams-getting-more-sophisticated-what-to-look-out-for-2020-2#hackers-will-start-by-targeting-low-level-employees-then-moving-laterally-to-compromise-executives-accounts-1

https://krebsonsecurity.com/2020/02/hackers-were-inside-citrix-for-five-months/

https://www.clearskysec.com/wp-content/uploads/2020/02/ClearSky-Fox-Kitten-Campaign.pdf