Article: Weekly Update 242 - published over 3 years ago. Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.A fairly hectic week this one, in a large part due to chasing down really flakey network issues that are causing devices (namely Shelly relays) to be inaccessible. I suspect it's ARP related and as of now, it's still... https://www.troyhunt.com/weekly-update-242/ Published: 2021 05 09 06:01:18 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
Article: Weekly Update 243 - published over 3 years ago. Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!This one is a real short intro as right now, it hurts to type (copy and paste is earlier 😊): I’m Back at a *REAL* Conference; Dealing with RSI; Shellies and MQTT; My IoT Aircon Hack; Drowning in Data Breaches... https://www.troyhunt.com/weekly-update-243/ Published: 2021 05 14 07:41:40 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Welcoming the Swedish Government to Have I Been Pwned - published over 3 years ago. Content: Presently sponsored by: ANY.RUN sandbox reveals a malicious sample in seconds. Try the unique approach with an interactive and easy process of analysis!Today I'm very happy to welcome the 16th government to Have I Been Pwned, Sweden. The Swedish National Computer Security Incident Response Team CERT-SE now has full and free access to query all government dom... https://www.troyhunt.com/welcoming-the-swedish-government-to-have-i-been-pwned/ Published: 2021 05 18 08:29:05 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Update 244 - published over 3 years ago. Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.For a week where I didn't think I had much to talk about, I was surprised by what I ended up with by the time I sat down to broadcast. Turns out there's always a lot to discuss, and that's before questions from the l... https://www.troyhunt.com/weekly-update-244/ Published: 2021 05 22 08:30:50 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
Article: Welcoming the Trinidad & Tobago Government to Have I Been Pwned - published over 3 years ago. Content: Presently sponsored by: Axonius gives IT and security teams the confidence they need to focus on the bigger picture. Learn more and try it free.Today I'm very happy to welcome the first Caribbean government to Have I Been Pwned, Trinidad & Tobago. As of today, the Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT) has full and free acce... https://www.troyhunt.com/welcoming-the-trinidad-and-tobago-government-to-have-i-been-pwned/ Published: 2021 05 24 07:40:40 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Pwned Passwords, Open Source in the .NET Foundation and Working with the FBI - published over 3 years ago. Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.I've got 2 massive things to announce today that have been a long time in the works and by pure coincidence, have aligned such that I can share them together here today. One you would have been waiting for and one totall... https://www.troyhunt.com/pwned-passwords-open-source-in-the-dot-net-foundation-and-working-with-the-fbi/ Published: 2021 05 27 15:00:00 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Update 245 - published over 3 years ago. Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.This week is the culmination of planning that began all the way back in August last year when I announced the intention to start open sourcing the HIBP code base. Today, it's finally happened with Pwned Passwords now com... https://www.troyhunt.com/weekly-update-245/ Published: 2021 05 28 07:22:54 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
Article: Welcoming the Dominican Republic Government to Have I Been Pwned - published over 3 years ago. Content: Presently sponsored by: Varonis. Reduce your SaaS blast radius with data-centric security for AWS, G Drive, Box, Salesforce, Slack and more.Continuing with the launch of the Have I Been Pwned Domain Search API to national government cyber agencies, I am very happy to welcome the first Latin American country on board, the Dominican Republic. Their National Cy... https://www.troyhunt.com/welcoming-the-dominican-republic-government-to-have-i-been-pwned/ Published: 2021 05 31 07:12:04 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Welcoming the Belgian Government to Have I Been Pwned - published over 3 years ago. Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.Supporting national CERTs with free API domain searches across their assets is becoming an increasing focus for Have I Been Pwned and today I'm happy to welcome the 19th government on board, Belgium.... https://www.troyhunt.com/welcoming-the-belgian-government-to-have-i-been-pwned/ Published: 2021 06 03 21:04:32 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Weekly Update 246 - published over 3 years ago. Content: Presently sponsored by: AppTrana Ranks #1 on Customer Experience in 2021 Gartner Peer Insights 'Voice of Customer' for WAF. Only Vendor with 100% recommendation.This week has been absolutely dominated by code contributions to Pwned Passwords. This is such an awesome, humbling experience that so many people have wanted to contribute their time to something th... https://www.troyhunt.com/weekly-update-246/ Published: 2021 06 06 01:36:19 Received: 2021 06 06 09:04:46 Feed: Troy Hunt's Blog Source: Troy Hunt's Blog Category: Cyber Security Topic: Cyber Security |
Article: Ofwat reveals it has received 20,000 spam and phishing emails so far this year - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/muddy-waters-ofwat-received-20000-spam-and-phishing-emails/ Published: 2021 05 13 13:21:42 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: New Executive Order Seeks to Strengthen Security of Federal Government Networks - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/government/new-executive-order-seeks-to-strengthen-security-of-federal-government-networks/ Published: 2021 05 14 14:39:16 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Mind the GAAP: A Lens for Understanding the Importance of the CIS Controls - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/security-controls/mind-the-gaap-a-lens-for-understanding-the-importance-of-the-cis-controls/ Published: 2021 05 17 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: Ghosts in the Machine – OT and IT Convergence - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/ics-security/ghosts-in-the-machine-ot-and-it-convergence/ Published: 2021 05 18 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Cybersecurity Training: Raising Awareness And Securing Your Business - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/cybersecurity-training-raising-awareness-and-securing-your-business/ Published: 2021 05 18 03:01:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Hacker Tools Used for Good as Exposed Amazon Cloud Storage Accounts Get Warnings - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cloud/hacker-tools-amazon-cloud-storage/ Published: 2021 05 18 08:42:49 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: Google’s Office of the CISO Points the Way Towards Scaling Security - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cloud/googles-office-of-the-ciso-points-the-way-towards-scaling-security/ Published: 2021 05 19 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: IT Network Attacks Can Impact Your OT Networks, Too - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/ics-security/it-network-attacks-can-impact-your-ot-networks-too/ Published: 2021 05 20 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Qlocker ransomware gang shuts shop after extorting owners of QNAP NAS drives - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/qlocker-ransomware-gang-shuts-shop-extorting-qnap-nas-drives/ Published: 2021 05 20 12:54:28 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: 5 Things to Do with MITRE ATT&CK – Tips and Tricks Special - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/mitre-framework/things-to-do-with-mitre-attck-tips-and-tricks-special/ Published: 2021 05 21 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Impact of GDPR on Cloud Service Providers - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cloud/impact-of-gdpr-on-cloud-service-providers/ Published: 2021 05 24 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Superior Integrity Monitoring: Getting Beyond Checkbox FIM - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/security-controls/superior-integrity-monitoring-getting-beyond-checkbox-fim/ Published: 2021 05 24 08:42:28 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: “Network Security” the Biggest Concern for Public Cloud Adoption, Reveals Survey - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cloud/network-security-biggest-concern-for-public-cloud-adoption-reveals-survey/ Published: 2021 05 25 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: 2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/risk-based-security-for-executives/risk-management/cybersecurity-mitigating-mobile-security-risks-for-cisos/ Published: 2021 05 26 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Tripwire Patch Priority Index for May 2021 - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/vert/tripwire-patch-priority-index-for-may-2021/ Published: 2021 05 27 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: A Fifth of IT Decision-Makers Not Confident in Their OT System Security, Reveals Survey - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/ics-security/it-decision-makers-not-confident-in-ot-system-security-survey/ Published: 2021 05 27 03:01:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Cryptocurrency scam attack on Twitter reminds users to check their app connections - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/cryptocurrency-scam-attack-twitter-check-app-connections/ Published: 2021 05 27 12:58:58 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Where Should I Spend My Time? Looking at Verizon DBIR & Executive Order - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/podcast/where-should-i-spend-my-time-looking-at-verizon-dbir-executive-order/ Published: 2021 05 31 07:25:16 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: U.S. Critical Infrastructure: Addressing Cyber Threats and the Importance of Prevention - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/critical-infrastructure-addressing-cyber-threats-importance-of-prevention/ Published: 2021 05 31 07:30:47 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: How to Apply the Risk Management Framework (RMF) - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/government/applying-risk-management-framework/ Published: 2021 06 01 09:34:05 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Understanding the Cloud Security Challenges for SMBs - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cloud/understanding-the-cloud-security-challenges-for-smbs/ Published: 2021 06 02 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: Overcoming Compliance Issues in Cloud Computing - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/featured/overcoming-compliance-issues-in-cloud-computing/ Published: 2021 06 03 03:00:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: #TripwireBookClub – The Crypto Dictionary - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/vert/tripwirebookclub-the-crypto-dictionary/ Published: 2021 06 03 03:01:00 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
|
Article: Cryptocurrency hacks wanted – $100,000 prize fund offered in cybercrime forum contest - published over 3 years ago. Content: https://www.tripwire.com/state-of-security/security-data-protection/cryptocurrency-hacks-wanted-100000-prize-fund-offered-in-cybercrime-forum-contest/ Published: 2021 06 03 16:05:55 Received: 2021 06 06 09:04:46 Feed: The State of Security Source: The State of Security Category: Cyber Security Topic: Cyber Security |
Article: Testing - published over 6 years ago. Content: Watch this video on YouTube. The post Testing appeared first on Roger's Information Security Blog. ... https://www.infosecblog.org/2018/06/testing/ Published: 2018 06 23 16:27:33 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Tuning up my WordPress Install - published over 6 years ago. Content: Dreamhost was sending me cryptic emails about my site using too many resources then dieing as a result. Then Jetpack site monitoring was finding the site down, presumably due to running out of resources. And the homepage loaded too slowly. So a technical problem was at hand. There aren’t a lot of resources out there for troubleshooting this sort of issue. ... https://www.infosecblog.org/2018/06/tuning-up-my-wordpress-install/ Published: 2018 06 24 01:22:12 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Link – What happens when you reply to spam email (Veitch) - published over 6 years ago. Content: There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appea... https://www.infosecblog.org/2018/08/link-what-happens-when-you-reply-to-spam-email-veitch/ Published: 2018 08 15 11:56:45 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Airplay Annoyance - published over 6 years ago. Content: I’ve never used Apple Airplay before. I have an AppleTV that was free for paying for a 3 month subscription with DirecTV Now. But I hadn’t intentionally fired it up since cancelling that subscription. This week I bought a new TV. While watching The Dark Knight on Netflix, suddenly the TV changes inputs to the AppleTV and Katherines Ipad is requesting t... https://www.infosecblog.org/2018/08/airplay-annoyance/ Published: 2018 08 18 03:22:57 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Kanye’s Password - published about 6 years ago. Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password. Its 00000. Not everyone is in on the joke. Some express OUTRAGE. “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead. He knew... https://www.infosecblog.org/2018/10/kanyes-password/ Published: 2018 10 12 22:48:44 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Its the most wonderful time of the year – Patching - published almost 6 years ago. Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern. The kids were out of college and ready to try out their skills. Christmas was worse because so many people were out of the office, no one would notice. Or if they did the response would be limited. Now that’s what we call Tuesday af... https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/ Published: 2018 12 19 23:46:33 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: Secure File Deletion - published almost 6 years ago. Content: Today I received an email inviting me to buy a Easy File Shredder product for a special price of $15 instead of the usual price of $50. Securely deleting sensitive data is really important. But is buying a product really needed? This type of thing has generally been needed because when you delete a file, you are essentially marking the file space as... https://www.infosecblog.org/2019/02/secure-file-deletion/ Published: 2019 02 23 19:12:08 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Beginner’s Mind - published over 5 years ago. Content: Shoshin is a word from Zen Buddhism meaning “beginner’s mind.” It refers to having an attitude of openness, eagerness, and a lack of preconceptions when studying a subject, even when studying at an advanced level. As IT people we aren’t always known for our attitude of openness, eagerness and lack of preconceptions. Its an easy field to get burnt out. ... https://www.infosecblog.org/2019/05/beginners-mind/ Published: 2019 05 28 13:53:39 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: CISSPs from Around the World - published about 4 years ago. Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ... https://www.infosecblog.org/2020/11/cissps-from-around-the-world/ Published: 2020 11 10 00:08:07 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
Article: CloudFlare Gateway DNS Filtering - published almost 4 years ago. Content: With some downtime over the holidays, I was checking in to see if my ISP has added IPv6 support yet. But sadly nothing had changed in months. So just for fun, I reset up a 6 in 4 tunnel to Hurricane Electric from my router. Sending traffic in a tunnel to HE rather than directly to its destination isn’t exactly going to speed things up. I’ve also he... https://www.infosecblog.org/2020/12/cloudflare-gateway-dns-filtering/ Published: 2020 12 28 03:57:45 Received: 2021 06 06 09:04:46 Feed: Roger's Information Security Blog Source: Roger's Information Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: No Really – What’s AI? - published over 4 years ago. Content: Last week I was speaking on a panel about the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference on “Building an AI Powered Intelligence Community”. It was fascinating to listen to some of the panels with people from the Hill talking about AI. I was specifically impressed with the really educated views on i... https://raffy.ch/blog/2020/03/09/no-really-whats-ai/ Published: 2020 03 10 03:30:59 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: Use of AI for Cyber Security in the Intelligence Community - published over 4 years ago. Content: This post is about capturing my talking points from the recent conference panel on the “Use of AI for Cybersecurity” at the Intelligence and National Security Alliance (INSA) conference. You can find my musings on the term AI in my previous blog post. Building an AI Powered Intelligence Community (Click image for video) Here is the list of topics I inje... https://raffy.ch/blog/2020/03/16/use-of-ai-for-cyber-security-in-the-intelligence-community/ Published: 2020 03 16 14:47:13 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: The Data Lakehouse Post 1 – My Database Wishlist – A Rant - published almost 4 years ago. Content: In 2015, I wrote a book about the Security Data Lake. At the time, the big data space was not as mature as today and especially the intersection of big data and security wasn’t a well understood area. Fast forward to today, people are talking about to the “Data Lakehouse“. A new concept that has been made possible by new database technologies, projects, and ... https://raffy.ch/blog/2021/02/02/the-data-lakehouse-post-1-my-database-wishlist-a-rant/ Published: 2021 02 02 23:18:40 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: The Data Lakehouse Post 2 – The Data Lakehouse Itself - published almost 4 years ago. Content: In my previous blog post, I ranted a little about database technologies and threw a few thoughts out there on what I think a better data system would be able to do. In this post, I am going to talk a bit about the concept of the Data Lakehouse. The term ‘data lakehouse‘ has been making the rounds in the data and analytics space for a couple of years. It d... https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-2-the-data-lakehouse-itself/ Published: 2021 02 08 16:22:11 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: The Data Lakehouse Post 3 – Catching Up with The Latest Big Data Developments - published almost 4 years ago. Content: I recently wrote a post about the concept of the Data Lakehouse, which in some ways, brings components of what I outlined in the first post around my desires for a new database system to life. In this post, I am going to make an attempt to describe a roll-up of some recent big data developments that you should be aware of. Let’s start with the lowest laye... https://raffy.ch/blog/2021/02/08/the-data-lakehouse-post-3-catching-up-with-the-latest-big-data-developments/ Published: 2021 02 08 16:25:58 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: 2021 Cyber Security Focus: “Unbound” - published over 3 years ago. Content: It’s already early March and the year is in full swing. Covid is still raging and we have been seeing some crazy weather patterns, especially in the south of the United States. While snowed in here in Texas, I took some time to reflect on what’s driving cyber security spend and customer focus this year. Overall, we can summarize the 2021 trends under the ter... https://raffy.ch/blog/2021/03/03/2021-cyber-security-focus-unbound/ Published: 2021 03 03 16:32:52 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: Asset Management – Back To The Roots - published over 3 years ago. Content: Asset management is one of the core components of many successful security programs. I am an advisor to Panaseer, a startup in the continuous compliance management space. I recently co-authored a blog post on my favorite security metric that is related to asset management: How many assets are in the environment? A simple number. A number that tells a c... https://raffy.ch/blog/2021/03/31/asset-management-back-to-the-roots/ Published: 2021 03 31 13:47:25 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: A Security Product Reference Model - published over 3 years ago. Content: On a recent consulting engagement with Cynergy Partners, we needed to decipher the security product market to an investment firm that normally doesn’t invest in cyber security. One of the investor’s concerns was that a lot of cyber companies are short-lived businesses due to the threats changing so drastically quick. One day it’s ransomware X, the next day i... https://raffy.ch/blog/2021/04/16/a-security-product-reference-model/ Published: 2021 04 16 21:30:24 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
Article: Taking Inventory – Where Do We Stand With AI and ML in Cyber Security? - published over 3 years ago. Content: Before diving into cyber security and how the industry is using AI at this point, let’s define the term AI first. Artificial Intelligence (AI), as the term is used today, is the overarching concept covering machine learning (supervised, including Deep Learning, and unsupervised), as well as other algorithmic approaches that are more than just simple statisti... https://raffy.ch/blog/2021/05/19/taking-inventory-where-do-we-stand-with-ai-and-ml-in-cyber-security/ Published: 2021 05 19 22:04:11 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: How To Drive Value with Security Data - published over 3 years ago. Content: We have been collecting data to drive security insights for over two decades. We call these tools log management solutions, SIMs (security information management), and XDRs (extended detection and response) platforms. Some companies have also built their own solutions on top of big data technologies. It’s been quite the journey. At the upcoming ThinkIn co... https://raffy.ch/blog/2021/06/03/how-to-drive-value-with-security-data/ Published: 2021 06 03 16:55:18 Received: 2021 06 06 09:04:46 Feed: Security Intelligence and Big Data Source: Security Intelligence and Big Data Category: Cyber Security Topic: Cyber Security |
|
Article: Shell Shock Rapid 7 Threatsweeper - published about 10 years ago. Content: By now, you may have heard about CVE-2014-6271, also known as the “bash bug“, or even “Shell Shock”, that may affect your organisation. It’s rated the maximum CVSS score of 10 for impact and ease of exploitability. The affected software, Bash (the Bourne Again SHell), is present on most Linux, BSD, and Unix-like systems, including Mac OS X. New packages were... https://penturalabs.wordpress.com/2014/09/26/shell-shock-rapid-7-threatsweeper/ Published: 2014 09 26 09:27:31 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
Article: New security flaw uncovered in WordPress - published about 10 years ago. Content: Researchers have revealed a potentially serious flaw in WordPress software, that allows hackers to search for abandoned or inactive WordPress sites before mounting phishing attacks aimed at enticing users to install infected updates. Hackers can then quickly hijack the website and direct visitors to deliver malicious content. WordPress is by far the most po... https://penturalabs.wordpress.com/2014/10/03/new-security-flaw-uncovered-in-wordpress/ Published: 2014 10 03 14:19:49 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: AT&T suffers insider data breach - published about 10 years ago. Content: AT&T has become the latest multinational company to suffer a data breach after one of its own employees gained access to customer data. The US mobile telecoms giant has started informing around 1,600 customers in Vermont that their personal data was breached in August. In a letter posted on the Vermont government’s website, AT&T confirmed that a form... https://penturalabs.wordpress.com/2014/10/09/att-suffers-insider-data-breach/ Published: 2014 10 09 14:32:02 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Kmart hit by card hack attack - published about 10 years ago. Content: It’s been revealed that a data breach at US retail chain Kmart that compromised card details lasted over a month. The discount department store said that the malware was discovered last week but had been operating since early September. Based on its investigation so far, the company said that it believes credit and debit cards were exposed but that no person... https://penturalabs.wordpress.com/2014/10/22/kmart-hit-by-card-hack-attack/ Published: 2014 10 22 15:20:17 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
Article: Research Reveals Cost of Online Fraud to UK - published about 10 years ago. Content: This week has been Get Safe Online Week and to coincide with the event, the National Fraud Intelligence Bureau researched cyber-crime in the UK. The research found that over the last year, the ten biggest online scams cost victims over £670m – although the actual figure is thought to be significantly higher than that due to unreported crimes. A separate poll... https://penturalabs.wordpress.com/2014/10/30/research-reveals-cost-of-online-fraud-to-uk/ Published: 2014 10 30 10:21:43 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Most businesses do not understand data breach risks - published about 10 years ago. Content: Research by HP has uncovered a lack of understanding among businesses of the risks associated with data breaches. More than 70% of US and UK executives surveyed by the Ponemon Institute said that their organisation does not understand fully the dangers of breaches, while less than half of top executives and board members are kept informed about the response ... https://penturalabs.wordpress.com/2014/11/07/most-businesses-do-not-understand-data-breach-risks/ Published: 2014 11 07 16:19:54 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: [IRCCloud] Inadequate input validation on API endpoint leading to self denial of service and increased system load - published about 9 years ago. Content: So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to: {“_reqid”:1234, “cid”:5678, “t... https://penturalabs.wordpress.com/2015/10/13/fuzzing-for-fun-and-profit/ Published: 2015 10 13 12:04:47 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
Article: [IRCCloud] History and Another XSS Bug Bounty - published about 9 years ago. Content: Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl... https://penturalabs.wordpress.com/2015/10/14/irccloud-history-and-another-xss-bug-bounty/ Published: 2015 10 14 10:50:15 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Finding and Exploiting Same Origin Method Execution vulnerabilities - published almost 9 years ago. Content: Recently it came to my attention that it was possible to abuse JSONP callbacks using a vulnerability known as SOME – Same Origin Method Execution which can be used by an attacker to widely abuse a user’s trust between the web application and the intended flow of execution. For example, using the SOME attack it is possible for an attacker to trick a user to v... https://penturalabs.wordpress.com/2015/12/30/finding-and-exploiting-same-origin-method-execution-vulnerabilities/ Published: 2015 12 30 23:37:46 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: SNMPPLUX - published over 8 years ago. Content: Pentura continually develop new tools and scripts to improve the effectiveness of the team. One such tool called SNMPPLUX is an offshoot of a larger development project (ORR). SNMPPLUX is a USM compliant SNMPv1, SNMPv2c and SNMPv3 authentication scanner powered by pysnmp, re, sys, getopt, array, time and multiprocessing python modules. As well as providin... https://penturalabs.wordpress.com/2016/04/01/snmpplux/ Published: 2016 04 01 08:21:28 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
Article: Regulator fines COVID-19 tracker for turning contact data into sales leads - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/19/regulator-fines-covid-19-tracker-for-turning-contact-data-into-sales-leads/ Published: 2021 05 19 18:53:54 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: S3 Ep33: Eufy camera leak, Afterburner crisis, and AirTags (again) [Podcast] - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/20/s3-ep33-eufy-camera-leak-afterburner-crisis-and-airtags-again-podcast/ Published: 2021 05 20 18:59:14 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: Naked Security Live – Jacked and hacked: how safe are tracking tags? - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/24/naked-security-live-jacked-and-hacked-how-safe-are-tracking-tags/ Published: 2021 05 24 18:48:27 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
Article: Eight suspects busted in raid on “home delivery” scamming operation - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/25/eight-suspects-busted-in-raid-on-home-delivery-scamming-operation/ Published: 2021 05 25 01:15:41 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: Apple patches dangerous security holes, one in active use – update now! - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/25/apple-patches-dangerous-security-holes-one-in-active-use-update-now/ Published: 2021 05 25 18:30:33 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: S3 Ep34: Apple bugs, scammers busted, and how crooks bypass 2FA [Podcast] - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/26/s3-ep34-apple-bugs-scammers-busted-and-how-crooks-bypass-2fa-podcast/ Published: 2021 05 26 18:56:50 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
Article: “Unpatchable” vuln in Apple’s new Mac chip – what you need to know - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/05/27/unpatchable-vuln-in-apples-new-mac-chip-what-you-need-to-know/ Published: 2021 05 27 18:59:00 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: “Have I Been Pwned” breach site partners with… the FBI! - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/06/02/have-i-been-pwned-breach-site-partners-with-the-fbi/ Published: 2021 06 02 18:55:00 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble [Podcast] - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/06/03/s3-ep35-apple-chip-flaw-have-i-been-pwned-and-covid-tracker-trouble-podcast/ Published: 2021 06 03 18:34:23 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
Article: How to hack into 5500 accounts… just using “credential stuffing” - published over 3 years ago. Content: https://nakedsecurity.sophos.com/2021/06/04/how-to-hack-into-5500-accounts-just-using-credential-stuffing/ Published: 2021 06 04 18:09:26 Received: 2021 06 06 09:04:45 Feed: Naked Security - Sophos Source: Naked Security - Sophos Category: Cyber Security Topic: Cyber Security |
|
Article: Apple releases iOS 8 with 56 security patches - published about 10 years ago. Content: http://www.livehacking.com/2014/09/18/apple-releases-ios-8-with-56-security-patches/ Published: 2014 09 18 07:22:43 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Shellshock: Code injection vulnerability found in Bash - published about 10 years ago. Content: http://www.livehacking.com/2014/09/26/shellshock-code-injection-vulnerability-found-in-bash/ Published: 2014 09 26 06:54:53 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: Source code for BadUSB vulnerability posted on GitHub - published about 10 years ago. Content: http://www.livehacking.com/2014/10/07/source-code-for-badusb-vulnerability-posted-on-github/ Published: 2014 10 07 11:10:03 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Alleged Dropbox hack underlines danger of reusing passwords - published about 10 years ago. Content: http://www.livehacking.com/2014/10/15/alleged-dropbox-hack-underlines-danger-of-reusing-passwords/ Published: 2014 10 15 08:03:16 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Apple release iOS 8.1 and Apple TV 7.0.1 with new security patches - published about 10 years ago. Content: http://www.livehacking.com/2014/10/21/apple-release-ios-8-1-and-apple-tv-7-0-1-with-new-security-patches/ Published: 2014 10 21 06:46:28 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: Email addresses stolen from CurrentC - published about 10 years ago. Content: http://www.livehacking.com/2014/10/31/email-addresses-stolen-from-currentc/ Published: 2014 10 31 10:07:54 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Apple patches security flaws in iOS 8, OS X 10.10 and Apple TV 7 - published about 10 years ago. Content: http://www.livehacking.com/2014/11/18/apple-patches-security-flaws-in-ios-8-os-x-10-10-and-apple-tv-7/ Published: 2014 11 18 07:15:30 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Sony hack shows that the company kept passwords stored in a folder called “Password” - published almost 10 years ago. Content: http://www.livehacking.com/2014/12/05/sony-hacks-shows-that-the-company-kept-passwords-stored-in-a-folder-called-password/ Published: 2014 12 05 10:48:59 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: Microsoft fixes 24 security vulnerabilities in December’s Patch Tuesday - published almost 10 years ago. Content: http://www.livehacking.com/2014/12/10/microsoft-fixes-24-security-vulnerabilities-in-decembers-patch-tuesday/ Published: 2014 12 10 07:34:11 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Apple updates OS X’s NTP server to address recently disclosed NTP vulnerabilities - published almost 10 years ago. Content: http://www.livehacking.com/2014/12/23/apple-updates-os-xs-to-address-ntp-vulnerabilities/ Published: 2014 12 23 08:39:04 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Microsoft to fix Windows vulnerability that Google publicly disclosed last week - published almost 10 years ago. Content: http://www.livehacking.com/2015/01/13/microsoft-to-fix-windows-vulnerability-that-google-publicly-disclosed-last-week/ Published: 2015 01 13 07:43:54 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: Google discloses three more zero-day vulnerabilities, this time for OS X - published almost 10 years ago. Content: http://www.livehacking.com/2015/01/23/google-discloses-three-more-zero-day-vulnerabilities-this-time-for-os-x/ Published: 2015 01 23 07:45:27 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Apple updates iOS, OS X and Apple TV in monster patch release - published almost 10 years ago. Content: http://www.livehacking.com/2015/01/28/apple-updates-ios-os-x-and-apple-tv/ Published: 2015 01 28 12:56:01 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Cross Site Scripting vulnerability found in IE 11 - published almost 10 years ago. Content: http://www.livehacking.com/2015/02/04/cross-site-scripting-vulnerability-found-in-ie-11/ Published: 2015 02 04 09:46:59 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: Google backpedals on its arbitrary vulnerability disclosure policy - published almost 10 years ago. Content: http://www.livehacking.com/2015/02/14/google-backpedals-on-its-arbitrary-vulnerability-disclosure-policy/ Published: 2015 02 14 10:58:46 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: WP-Slimstat vulnerability exposes WordPress websites to SQL injection attacks - published over 9 years ago. Content: http://www.livehacking.com/2015/02/25/wp-slimstat-vulnerability/ Published: 2015 02 25 11:37:19 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: FREAK vulnerability weakens secure Web sites - published over 9 years ago. Content: http://www.livehacking.com/2015/03/04/freak/ Published: 2015 03 04 09:24:02 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
Article: The OpenSSL project releases new versions of its software to squash 12 security vulnerabilities - published over 9 years ago. Content: http://www.livehacking.com/2015/03/19/new-versions-openssl-to-squash-12-security-vulnerabilities/ Published: 2015 03 19 14:56:46 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: Apple fixes security vulnerabilities in Safari, OS X, iOS and Apple TV - published over 9 years ago. Content: http://www.livehacking.com/2015/04/09/apple-fixes-security-vulnerabilities-in-safari-os-x-ios-and-apple-tv/ Published: 2015 04 09 07:37:20 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor