Weekly Update 327It's my last weekly update on the road for a while! As enjoyable as travel is, I'm looking forward to getting back to a...
Day: February 27, 2023
Weekly Update 328
Weekly Update 328We made it! That's 2022 done and dusted, and what a year it was, both professionally and personally. It feels great to get to...
Weekly Update 329
Weekly Update 329Strap yourself in, this is a big one! Big video, big breach (scrape?), and a big audience today. The Twitter incident consumed a heap...
Weekly Update 330
Weekly Update 330Big week! So big, in fact, that I rushed into this week's update less prepared and made it a very casual one, which is...
Pwned or Bot
Pwned or BotIt's fascinating to see how creative people can get with breached data. Of course there's all the nasty stuff (phishing, identity theft, spam), but...
Weekly Update 331
Weekly Update 331Well and truly back into the swing of things in the new year, I think what I've found most satisfying this week is to...
Weekly Update 333
Weekly Update 333Getting everything out nice and early today so we can get out there in hit the wake park in the balmy "well over 30C"...
Weekly Update 332
Weekly Update 332Breaches all over the place today! Well, this past week, and there's some debate as to whether one of them is a breach, a...
Pwned Passwords Adds NTLM Support to the Firehose
Pwned Passwords Adds NTLM Support to the FirehoseI think I've pretty much captured it all in the title of this post but as of about a...
Weekly Update 334
Weekly Update 334Did I really need to get a connected BBQ? No more than I needed to connect most of the other things in the house...
Weekly Update 335
Weekly Update 335No cyber. It's literally a "cyber-free" week, as least far as the term relates to security things. Instead, I'm unboxing an armful of Insta360...
Down the Cloudflare / Stripe / OWASP Rabbit Hole: A Tale of 6 Rabbits Deep ? ? ? ? ? ?
Down the Cloudflare / Stripe / OWASP Rabbit Hole: A Tale of 6 Rabbits Deep ? ? ? ? ? ?I found myself going down a...
Weekly Update 336
Weekly Update 336Hey, it's double-Troy! I'm playing with the Insta360 Link cam, a gimbal-based model that can follow you around the room. It's tiny and pretty...
Researchers Warn: Cybercriminals Are Targeting Data Center Providers
Researchers Warn: Cybercriminals Are Targeting Data Center ProvidersThere has been a surge in cyber-attacks against cloud service providers (CSPs) and managed service providers (MSPs). Resecurity recently alerted...
Warning! New Malware Hijacks YouTube and Facebook Accounts
Warning! New Malware Hijacks YouTube and Facebook AccountsA new S1deload Stealer malware campaign infects YouTube and Facebook users as hackers try to use their devices for...
Rackspace Ransomware Attack Update: What You Need to Know
Rackspace Ransomware Attack Update: What You Need to KnowDuring the recent Rackspace ransomware attack, the company confirmed hackers accessed customer data. Rackspace staff and cybersecurity researchers have...
What Is Managed Extended Detection and Response (MXDR)?
What Is Managed Extended Detection and Response (MXDR)?Managed Extended Detection and Response (MXDR) is yet another step toward the perfect security solution. Researchers designed MXDR with...
Activision Breached: Here Is What Happened
Activision Breached: Here Is What HappenedGame developer Activision confirms that it suffered a data breach in December 2022. The threat actors gained access to the company’s...
Access-as-a-Service: How to Keep Access Brokers Away from Your Organization
Access-as-a-Service: How to Keep Access Brokers Away from Your OrganizationAn attacker’s access to the network is often traced back to a succession of events, which network...
What Is Internet Control Message Protocol (ICMP)?
What Is Internet Control Message Protocol (ICMP)?The Internet Control Message Protocol (ICMP) is a protocol built into the IP suite whose main function is to allow...
Hackers Claim They Breached Telus, Canada’s Second-largest Telecom Company
Hackers Claim They Breached Telus, Canada’s Second-largest Telecom CompanyTelus is now investigating the possibility of a data breach affecting its corporate data. The Canadian telecom company...
WSUS Alternative for Patch Management
WSUS Alternative for Patch ManagementWe already know that patching is a practice of the utmost importance when it comes to the security of businesses. WSUS has...
KPI Examples for Patch and Vulnerability Management
KPI Examples for Patch and Vulnerability ManagementVulnerability and patch management are vital cogs in an organization’s cyber-hygiene plan. According to a recent Verizon cyber-safety report, more...
Food Giant Dole, Victim of a Ransomware Attack
Food Giant Dole, Victim of a Ransomware AttackDole Food Company, one of the world’s largest suppliers of fresh fruit and vegetables, has revealed that it has...
Dish Network Goes Offline: A Cyberattack Might Be the Cause
Dish Network Goes Offline: A Cyberattack Might Be the CauseDish Network, an American TV and satellite broadcast provider, has experienced problems with both its website and...
Stanford University Is Facing a Data Breach
Stanford University Is Facing a Data BreachStanford University discovered a breach that affected its data between December 2022 and January 2023. Threat actors exfiltrated files containing...
PureCrypter Malware Is Targeting Government Entities
PureCrypter Malware Is Targeting Government EntitiesA threat actor has been spotted delivering several information stealers and ransomware strains to government organizations via the PureCrypter malware downloader....
What Is Identity as a Service (IDaaS)?
What Is Identity as a Service (IDaaS)?The X-as-a-service approach in information technology is quite simple to understand. It means that a feature is being provided to...
How to remove yourself from the internet and from people search sites
How to remove yourself from the internet and from people search sitesGraham Cluley Security News is sponsored this week by the folks at Incogni. Thanks to...
Smashing Security podcast #308: Jail after VPN fail, criminal messaging apps, and wolf-crying watches
Smashing Security podcast #308: Jail after VPN fail, criminal messaging apps, and wolf-crying watchesWhen Ubiquiti suffered a hack the world assumed it was just a regular...