Tag Archives: breach

Defensive Security Podcast Episode 155

https://www.cooley.com/california-attorney-general-2016-data-breach-report

http://www.csoonline.com/article/3049392/security/chinese-scammers-take-mattel-to-the-bank-phishing-them-for-3-million.html

http://www.oreilly.com/security/newsletter

http://conferences.oreilly.com/security/network-data-security-ny

Defensive Security Podcast Episode 151

http://www.databreachtoday.com/anthem-breach-lessons-one-year-later-a-8897

http://www.dw.com/en/hackers-hold-german-hospital-data-hostage/a-19076030

http://krebsonsecurity.com/2016/02/breached-credit-union-comes-out-of-its-shell/

http://arstechnica.com/security/2016/02/hackers-did-indeed-cause-ukrainian-power-outage-us-report-concludes/

Defensive Security Podcast Episode 149

http://www.tripwire.com/state-of-security/latest-security-news/cisco-patches-critical-asa-ike-buffer-overflow-vulnerability/

http://www.securityweek.com/we-cant-give-preventing-breaches

http://www.csoonline.com/article/3033160/security/ransomware-takes-hollywood-hospital-offline-36m-demanded-by-attackers.html

http://arstechnica.com/security/2016/02/clever-bank-hack-allowed-crooks-to-make-unlimited-atm-withdrawals/

Defensive Security Podcast Episode 96

Defensive Security Podcast Episode 91

http://news.yahoo.com/j-p-morgan-found-hackers-breach-corporate-event-010203954–sector.html

Defensive Security Podcast Episode 80

[1] Recovering from a hacked website

[2] Albertson’s and Supervalu hacked

[3] VNC everywhere!!!!

[4] HTTPS as a solution to network injection appliances

[5] Tennessee company sues its bank to recover stolen money

[6] 7 places to check for signs of a targeted attack in your network

===================

[1] http://blog.soundidea.co.za/articles/Your_websites_been_hacked_now_what-378.html
[2] http://money.cnn.com/2014/08/15/technology/security/albertsons-supervalu-hack/index.html
[3] http://www.forbes.com/sites/kashmirhill/2014/08/13/so-many-pwns/
[4] http://www.theregister.co.uk/2014/08/16/time_to_ditch_http_state_network_injection_attacks_documented_in_the_wild/
[5] http://krebsonsecurity.com/2014/08/tenn-utility-sues-bank-over-327k-cyberheist/
[6] http://blog.trendmicro.com/trendlabs-security-intelligence/7-places-to-check-for-signs-of-a-targeted-attack-in-your-network/

Defensive Security Podcast Episode 75

SEC investigating breached companies; How companies can rebuild trust after a security breach; Preparing your company for a ransom attack; BAE retracts the story on hedge fund hack; Hackers compromising businesses via 3rd parties and remote access.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://www.sfgate.com/business/article/Hacked-companies-face-SEC-scrutiny-over-5596541.php
http://www.forbes.com/sites/katevinton/2014/07/01/how-companies-can-rebuild-trust-after-a-security-breach/
http://akamai.infoworld.com/d/security/prepare-yourself-high-stakes-cyber-ransom-245320
http://www.theregister.co.uk/2014/07/03/bae_retracts_hedge_fund_hack_allegation/
http://www.computerworld.com/s/article/9249516/Hackers_hit_more_businesses_through_remote_access_accounts

Defensive Security Podcast Episode 71

Advice from Bob; SEC asks public companies to disclose more breaches; 230k IPMI devices found in Internet scan; PF Changs may have been hacked; Building network security to fail; 5 lessons from companies that get security right; Advice in responding to Anonymous threats; Bank of England announces assessment framework; Target shoppers don’t seem to be fazed by breach; Target board is under fire; Truecrypt may be coming back.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://www.reuters.com/article/2014/06/10/sec-cybersecurity-aguilar-idUSL2N0OR13U20140610

https://securityledger.com/2014/06/ipmi-insecurity-affects-200k-systems/

http://krebsonsecurity.com/2014/06/banks-credit-card-breach-at-p-f-changs/

http://www.forbes.com/sites/davelewis/2014/06/03/network-security-build-to-fail/

http://www.infoworld.com/d/security/5-lessons-companies-get-computer-security-right-243407

http://cyberwarzone.com/hackers-behind-oppetrol-will-attack-june-20-2014/

http://www.mondovisione.com/media-and-resources/news/bank-of-england-launches-new-framework-to-test-for-cyber-vulnerabilities/

http://www.dailyfinance.com/2014/06/05/target-data-breach-shoppers-dont-care/

http://www.startribune.com/business/261527581.html

http://www.wired.com/2014/06/bleed/

http://www.forbes.com/sites/jameslyne/2014/06/02/truecrypt-is-back-but-should-it-be/

Fuckyer: https://m.youtube.com/watch?v=2I-nudEqz7o

Defensive Security Podcast Episode 70

Privileged user security; FTC holding companies to a mysterious security standard; Information overload; business users bypass IT and go straight to the cloud.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://www.trustedcs.com/resources/whitepapers/Ponemon-RaytheonPrivilegedUserAbuseResearchReport.pdf
http://www.computing.co.uk/ctg/news/2345362/businesses-risk-data-breaches-due-to-confusion-over-privileged-user-information-security
http://www.networkworld.com/news/2014/053014-companies-should-already-know-how-282091.html
http://www.networkworld.com/research/2014/052914-information-overload-finding-signals-in-282019.html
http://www.networkworld.com/news/2014/052714-business-users-bypass-it-and-281911.html

Defensive Security Podcast Episode 69

Advice from Bob on the importance of an accurate inventory; TrueCrypt meets an unfortunate end; Weak passwords are responsible for the initial intrusion in 31% of breaches; 71% of exploits used Java; 59% of malicious email used an attachment, 41% used a link; NTT’s Global Threat Intelligence Report finds that most incidents are the result of failing to take basic precautions; DHS reports about a public utility compromised by a brute force attack; There is an apparent discrepancy between the severity of the breaches detailed in the recent  DOJ indictment of alleged Chinese hackers and the way that the breached companies categorize was was stolen, and whether that loss needed to be reported to share holders.

Subscribe in iTunes | Podcast RSS Feed | Twitter Email
http://arstechnica.com/security/2014/05/bombshell-truecrypt-advisory-backdoor-hack-hoax-none-of-the-above/
http://blog.itgovernance.co.uk/weak-passwords-responsible-for-31-of-cyber-attacks/

http://www.techcentral.co.za/surge-in-security-breaches-report/48374/
http://t.esecurityplanet.com/esecurityplanet/#!/entry/lowes-acknowledges-third-party-data-breach,5383580a025312186c0cf074
http://www.myce.com/news/only-51-of-anti-virus-scanners-detect-zero-day-malware-71652/
http://www.itproportal.com/2014/05/26/stop-the-blame-game-report-reveals-the-secrets-to-business-it-security/
http://news.techworld.com/security/3520791/public-utility-compromised-after-brute-force-attack-dhs-says/
http://mobile.bloomberg.com/news/2014-05-21/u-s-companies-hacked-by-chinese-didn-t-tell-investors.html