Malware Devil

Wednesday, February 3, 2021

BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Geller Bedoya’s ‘Serverless Osquery Backend And Big Data Exploration’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/bsidessf-2020-geller-bedoyas-serverless-osquery-backend-and-big-data-exploration/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-geller-bedoyas-serverless-osquery-backend-and-big-data-exploration

Acting Skills Helped Me Become a Vishing Professional

Our readers often ask about acting skills and classes. Curt Klump is sharing how acting skills helped him become a vishing professional.

The post Acting Skills Helped Me Become a Vishing Professional appeared first on Security Through Education.

The post Acting Skills Helped Me Become a Vishing Professional appeared first on Security Boulevard.

Read More

The post Acting Skills Helped Me Become a Vishing Professional appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/acting-skills-helped-me-become-a-vishing-professional/?utm_source=rss&utm_medium=rss&utm_campaign=acting-skills-helped-me-become-a-vishing-professional

How to Protect Apps from Hackers

The usage of technology is increasing day-by-day, and so are the risks. Many times, it has happened that you try using different apps without understanding potential threats. Considering that, it is always essential to opt for penetration testing. Pen testing is a common procedure of routine security testing activities, protecting your app from hackers. Especially […]

The post How to Protect Apps from Hackers appeared first on TechSpective.

The post How to Protect Apps from Hackers appeared first on Security Boulevard.

Read More

The post How to Protect Apps from Hackers appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/how-to-protect-apps-from-hackers/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-protect-apps-from-hackers

Browser sync—what are the risks of turning it on?

Modern browsers include synchronization features (like Google Chrome’s Sync) so that all your browsers, on all your devices, share the same tabs, passwords, plugins, and other features. While this is certainly convenient, particularly when you’re migrating to a new device, synchronizing browsers also comes with some risks.

What is browser sync?

Browser syncing was introduced in 2012 by Chrome with the goal of letting you continue at home where you left off at work, and vice versa. Since then, other browsers have introduced similar features. There are slight differences between them when it comes what you can synchronize, but the basics are pretty much the same for most of them.

When Chrome Sync is toggled on, the synchronised information includes bookmarks, passwords, history, open tabs, settings, preferences, and, in some cases, even payment information saved in Google Pay.

Firefox lets you synchronize your data and preferences—such as your bookmarks, history, passwords, open tabs, and installed add-ons—across all your devices.

Microsoft Edge can synchronize your favorites, passwords, and other browser data—including payment information—across all your signed-in devices.

Opera lets users synchronize their bookmarks, settings, and open tabs between mobile and desktop browsers. Earlier, Opera required users to create an account and sign in on both platforms, or use the more limited “Opera Touch” app in order to do so. After users install the latest Android and desktop updates, however, they can synchronize all that data across devices within the core apps using a QR code, no need for an account.

Sharing with strangers

Synchronized data can include browser history, bookmarks, passwords, cookies, and other information that users consider private and typically have no intention of sharing with anyone else. Password, cookie and payment card secrecy is also important for security. Browser synchronization increases the risk of you inadvertently sharing that information with other users of the computers you sync between.

It’s important to consider whether you are truly the only user of a system that is set to synchronize. Imagine what can happen if your kids are playing with your home laptop and it synchronizes to your work system.

You should also consider the risk of your device being lost or stolen but continuing to sync your information to the thief (as if there wasn’t enough stress involved in losing a device.)

Another thing to consider before synchronizing is that having a universal ID for all your systems can lead a hacker from one of your systems to all of them!

Spreading danger

Security threats can also be copied from one device to another, in the form of malicious extensions (also called plugins or add-ons), and open tabs.

Malware in the form of browser extensions is relatively rare, but it does happen. We have seen infected JavaScript-based extensions with malicious code that made it possible to introduce malware to an affected system.

Google regularly has to clear out bad extensions from its Chrome Web Store. While many of those extensions would fall into the categories of Potentially Unwanted Programs (PUPs) or adware, they can still cause problems and many would be frowned upon if you introduced them into your work environment by synchronizing from your home browser.

Open tabs are potentially even more risky. While most browsers have built-in methods to get out of browlocks, copying them to another device is undesirable.

Differences in patching and security software between machines can also create opportunities for threats to thrive. While a malicious website might be harmless on your personal device, because of local protection, it might seize the opportunity if the tab it’s in is synchronized to a work device that relies on different security measures.

Cloud privacy issues

Another reason why some people dislike the idea of synchronizing browsers is because the synchronized data isn’t just shared between devices, it’s also stored in the cloud, under the control of the browser vendor.

Not all browsers are the same here. The popular Firefox browser encrypts your data locally—with a cryptographically secure, randomly generated key—before storing it in the cloud, so it can’t read your information. Chrome users who want similar protection must set a passphrase.

People who just don’t like that idea of sharing their information with browser vendors, even if it’s encrypted, can use specialized software that promises to synchronize your browser data in a more secure way.

Chrome disables sync API for third-parties

Recently a story that is sideways related hit the news. Google issued a statement saying that it will block third-party Chromium web browsers from using private Google APIs that were only intended for Chome. (Chromium is an open source project run by Google that provides most of the code for Google Chrome, and forms the basis of other popular browsers like Microsoft Edge and Brave.)

Google Chrome Engineering Director Jochen Eisinger stated:

“During a recent audit, we discovered that some third-party Chromium-based browsers were able to integrate Google features, such as Chrome sync and Click to Call, that are only intended for Google’s use.”

Google will limit 3rd party Chromium browsers from accessing private Chrome APIs starting March 15, 2021. However, Google says that users who have accessed private Google features such as Chrome Sync while using third-party browsers will still be able to access the synchronized data locally or in their Google account, depending on their settings. And if you should decide to look into the third-party alternatives we talked about earlier, you will find that some of these will provide you with options to synchronize other Chromium browsers.

An informed decision

An informed decision is all we can hope to offer you. Before you decide it’s safe to synchronize your browser data, these are the questions we would like you to ask:

  • Is the owner of the two devices the same? If this is not the case, it wouldn’t hurt to ask for permission first.
  • Is the main user of the two devices the same person? If not, synchronizing could leak data, or be considered spying on someone.
  • Do you trust the provider of the synchronization service and its cloud facility to handle your data with care?
  • What are the chances of carrying over malicious content from one device to another? Are both devices equally well protected?

Asking these questions will remind you of what could go wrong and help you decide whether it is worth it.

Stay safe, everyone!

The post Browser sync—what are the risks of turning it on? appeared first on Malwarebytes Labs.

The post Browser sync—what are the risks of turning it on? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/browser-sync-what-are-the-risks-of-turning-it-on/?utm_source=rss&utm_medium=rss&utm_campaign=browser-sync-what-are-the-risks-of-turning-it-on

Public Sector Cybersecurity Priorities in 2021


English
Tags: 
<a href=’/blog?tag=’></a> <a href=’/blog?tag=’></a> <a href=’/blog?tag=’></a>

2020 was a year of unprecedented challenge for anyone working in public sector cybersecurity. As well as juggling the usual trials and tribulations that come with working in cybersecurity, it was a year that brought a global pandemic. This meant that almost overnight, employees had to work from home and cybersecurity teams had to do everything in their power to ensure that systems and data remained safe and secure.

With no immediate end in sight to the on-going COVID-19 situation, it looks like homeworking and all the attendant cybersecurity threats that come it will continue for some time. Even if the vaccines work and the world returns to a semblance of normality later in 2021, it looks like the pandemic has changed our working patterns for good – according to a survey by Price Waterhouse Coopers, 83 percent of workers want to work from home at least one day a week and 55 percent of employers anticipate most of their workers will do so long after the pandemic has passed.

What does this mean for cybersecurity in the public sector in 2021 and what can organizations do to improve their security posture?

Increase Cybersecurity Awareness and Best Practices

Clearswift launched research with UK public sector cybersecurity workers in May 2020. The Unknown Threat sought to highlight areas of vulnerability in the public sector and bring to light any areas of poor practices that cybersecurity teams might be unaware of. Although the UK public sector has made great advances in cybersecurity over the past four or five years, the findings in our research were concerning.

There was a widespread lack of awareness of cybersecurity, with almost half of respondents having either not heard of, or not knowing what ransomware is. Outdated operating systems are a common point of entry for cyber-criminals, and the research found that 11% of public sector employees were still using Windows 7 – this has not been supported by Microsoft since January 2020.

This all makes very clear the requirement for training and best practice guidance for employees. If an employee can at least recognise a malicious email, then they will
be far less likely to click on a link or open a file or image containing ransomware. This need has only increased since the emergence of COVID-19, as a distributed workforce lacks the usual corporate cybersecurity defenses and is perhaps more distracted when juggling work with home-schooling.

Prioritize the Security of Data

Remote collaboration increases the risk that an organizations’ data is not always shared securely 100 percent of the time. With employees sending and receiving sensitive information to each other or to third parties, files can be easily compromised unless protected by a secure solution. 

Manage File Transfer (MFT) solutions automate the safe transfer of files, both inside and outside the organization. HelpSystems’ award-winning MFT solution uses encryption and authentication to keep sensitive data secure when sharing files. Without an enterprise solution in place, employees may revert to using software they are familiar with, such as DropBox, Google Drive and others, and while these are fine for personal use, they can’t assure the comprehensive protection a public sector organization needs to minimize data loss or cyber threats.

Combining MFT software with Clearswift’s ICAP Gateway creates an even more effective solution as files are automatically sanitized of embedded cyber threats such as ransomware and any unauthorized sensitive data is removed.

Manage Digital Transformation and the Move to Office 365

Digital transformation has been an objective in both the private and public sectors for a number of years now, and while there has been undoubted progress, there is mounting pressure for the public sector to go even further. This includes the digitalisation of many services and investment in modern systems that help people access government data online.

COVID-19 also served to accelerate many trends that were already gathering pace and momentum, and one-such digital transformation trend is the move to Office 365. The effectiveness of this comprehensive collaboration suite is undeniable with many public sector organizations already benefitting from its cloud-based capabilities. But in the rush for cost-effective deployments, are public sector organizations missing out on vital security for emails for example because the level they’ve bought into does not provide adequate protection for sensitive data or cyber-attacks?

Clearswift’s email security solution is used by many public sector organizations to close these gaps in security. Working in parallel with Office 365 deployments, it provides more robust and rounded protection from ransomware threats and sensitive data loss.

Building for 2021 and Beyond

It is going to be another tough year for cybersecurity teams, balancing the day-to-day security demands – made even harder by the on-going pandemic – with the need for digital transformation and adapting to the future.

Achieving both requires a combination of agility and forward-thinking. Increasingly this involves working with in partnership with cybersecurity vendors who can provide and integrate best-in-class solutions. HelpSystems Data Security Tools help keep public sector organizations safe and secure from the ever-evolving challenges that face them.

Let us work with you to understand your cybersecurity goals, starting with an initial consultation to discuss your priorities and how we might help you achieve them.

Book a Meeting with the Team

Additional Resources

Report: New Research Uncovers the Cybersecurity State-of-play in UK Public Sector
Blog: Why do I Need a Managed File Transfer Solution?
Webinar: How to Enhance Data Loss Prevention in Office 365

Tags: 

The post Public Sector Cybersecurity Priorities in 2021 appeared first on Security Boulevard.

Read More

The post Public Sector Cybersecurity Priorities in 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/public-sector-cybersecurity-priorities-in-2021/?utm_source=rss&utm_medium=rss&utm_campaign=public-sector-cybersecurity-priorities-in-2021

Ensuring Security and Compliance in AWS RDS with CDS

If you use AWS RDS, your organization is part of a worldwide trend. Forward-thinking companies everywhere are embracing database-as-a-service (DBaaS) to help bring new applications and services to market faster, or to reduce the cost and complexity of their database operations. What isn’t changing for these organizations, however, is their long list of security and […]

The post Ensuring Security and Compliance in AWS RDS with CDS appeared first on Blog.

The post Ensuring Security and Compliance in AWS RDS with CDS appeared first on Security Boulevard.

Read More

The post Ensuring Security and Compliance in AWS RDS with CDS appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/ensuring-security-and-compliance-in-aws-rds-with-cds/?utm_source=rss&utm_medium=rss&utm_campaign=ensuring-security-and-compliance-in-aws-rds-with-cds

An Observability Pipeline Could Save Your SecOps Team

Traditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.

The post An Observability Pipeline Could Save Your SecOps Team appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/an-observability-pipeline-could-save-your-secops-team-2/?utm_source=rss&utm_medium=rss&utm_campaign=an-observability-pipeline-could-save-your-secops-team-2

XKCD ‘Hug Count’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Hug Count’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Hug Count’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/xkcd-hug-count/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-hug-count

An Observability Pipeline Could Save Your SecOps Team

Traditional monitoring approaches are proving brittle as security operations teams need better visibility into dynamic environments.

The post An Observability Pipeline Could Save Your SecOps Team appeared first on Malware Devil.



https://malwaredevil.com/2021/02/03/an-observability-pipeline-could-save-your-secops-team/?utm_source=rss&utm_medium=rss&utm_campaign=an-observability-pipeline-could-save-your-secops-team

Tuesday, February 2, 2021

TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97

This week in the Security News, Dr. Doug talks TikTok naughtiness, Sonic Wall, the NSA, BigNox, Slipstreaming, and ESET research! Jason Wood returns with Expert Commentary on the US Court System Going back to Paper-Only for Sensitive Documents!

Time Stamps:

1:16 – Special Dedication

1:41 – Congress orders NSA for a report on Juniper breach in wake of Solarwinds Supply Chain attack

4:04 – BigNox’s NoxPlayer allegedly installs malware

4:52 – Apple issues Patches for NAT Slipstreaming 2.0 Attack

7:28 – SonicWall SMA 100 zero day exploit being used in the wild

8:51 – New Linux Malware Steals SSH credentials from Supercomputers

10:20 – Ransomware now has industrial target square in their sights

11:49 – Microsoft reissues EOL for Skype on 31 July

22:40 – TikTok Silhouette Challenge filters can be removed

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn97

The post TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97-3/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97-3

TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97

This week in the Security News, Dr. Doug talks TikTok naughtiness, Sonic Wall, the NSA, BigNox, Slipstreaming, and ESET research! Jason Wood returns with Expert Commentary on the US Court System Going back to Paper-Only for Sensitive Documents!

Time Stamps:

1:16 – Special Dedication

1:41 – Congress orders NSA for a report on Juniper breach in wake of Solarwinds Supply Chain attack

4:04 – BigNox’s NoxPlayer allegedly installs malware

4:52 – Apple issues Patches for NAT Slipstreaming 2.0 Attack

7:28 – SonicWall SMA 100 zero day exploit being used in the wild

8:51 – New Linux Malware Steals SSH credentials from Supercomputers

10:20 – Ransomware now has industrial target square in their sights

11:49 – Microsoft reissues EOL for Skype on 31 July

22:40 – TikTok Silhouette Challenge filters can be removed

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn97

The post TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97-2/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97-2

TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97

This week in the Security News, Dr. Doug talks TikTok naughtiness, Sonic Wall, the NSA, BigNox, Slipstreaming, and ESET research! Jason Wood returns with Expert Commentary on the US Court System Going back to Paper-Only for Sensitive Documents!

Time Stamps:

1:16 – Special Dedication

1:41 – Congress orders NSA for a report on Juniper breach in wake of Solarwinds Supply Chain attack

4:04 – BigNox’s NoxPlayer allegedly installs malware

4:52 – Apple issues Patches for NAT Slipstreaming 2.0 Attack

7:28 – SonicWall SMA 100 zero day exploit being used in the wild

8:51 – New Linux Malware Steals SSH credentials from Supercomputers

10:20 – Ransomware now has industrial target square in their sights

11:49 – Microsoft reissues EOL for Skype on 31 July

22:40 – TikTok Silhouette Challenge filters can be removed

Visit https://www.securityweekly.com/swn for all the latest episodes!

Show Notes: https://securityweekly.com/swn97

The post TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET & Jason Wood – SWN #97 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97/?utm_source=rss&utm_medium=rss&utm_campaign=tiktok-sonic-wall-nsa-bignox-slipstreaming-eset-jason-wood-swn-97

The Security Poverty Line, Part 2 – Wendy Nather – SCW #60

Securing an organization means more than just spending money. For those that fall below the “security poverty line,” many other dynamics come into play that make it harder for them to accomplish even the basics. How do we help them rather than scolding them?

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw60

The post The Security Poverty Line, Part 2 – Wendy Nather – SCW #60 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/the-security-poverty-line-part-2-wendy-nather-scw-60/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-poverty-line-part-2-wendy-nather-scw-60

Is it time for some threat hunting?

The discovery of the massive SolarWinds supply chain hack has many companies wondering if they were affected. Not using the affected SolarWinds software isn’t a guarantee, as a hack could come via an affected third-party vendor. More generally, many CIOs and CISOs are losing sleep over the larger implications: the thought that they might have been hacked in the […]

The post Is it time for some threat hunting? appeared first on SecureLink.

The post Is it time for some threat hunting? appeared first on Security Boulevard.

Read More

The post Is it time for some threat hunting? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/is-it-time-for-some-threat-hunting-2/?utm_source=rss&utm_medium=rss&utm_campaign=is-it-time-for-some-threat-hunting-2

Black Hat Asia

Virtual Event

The post Black Hat Asia appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/black-hat-asia/?utm_source=rss&utm_medium=rss&utm_campaign=black-hat-asia

The Security Poverty Line, Part 1 – Wendy Nather – SCW #60

Securing an organization means more than just spending money. For those that fall below the “security poverty line,” many other dynamics come into play that make it harder for them to accomplish even the basics. How do we help them rather than scolding them?

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw60

The post The Security Poverty Line, Part 1 – Wendy Nather – SCW #60 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/the-security-poverty-line-part-1-wendy-nather-scw-60-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-poverty-line-part-1-wendy-nather-scw-60-2

The Security Poverty Line, Part 1 – Wendy Nather – SCW #60

Securing an organization means more than just spending money. For those that fall below the “security poverty line,” many other dynamics come into play that make it harder for them to accomplish even the basics. How do we help them rather than scolding them?

Visit https://www.securityweekly.com/scw for all the latest episodes!

Show Notes: https://securityweekly.com/scw60

The post The Security Poverty Line, Part 1 – Wendy Nather – SCW #60 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/the-security-poverty-line-part-1-wendy-nather-scw-60/?utm_source=rss&utm_medium=rss&utm_campaign=the-security-poverty-line-part-1-wendy-nather-scw-60

Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable

An enterprise’s inability to detect cyber attacks has tangible effects on its productivity and profitability. Various reports have noted a correlation between the time it takes to spot an intrusion and the cost of recovery.

The post Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable appeared first on Security Boulevard.

Read More

The post Why Responding to a Cyber Attack with a Traditional SIEM Leaves You Vulnerable appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/why-responding-to-a-cyber-attack-with-a-traditional-siem-leaves-you-vulnerable/?utm_source=rss&utm_medium=rss&utm_campaign=why-responding-to-a-cyber-attack-with-a-traditional-siem-leaves-you-vulnerable

‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered

ValidCC, a dark web bazaar run by a cybercrime group that for more than six years hacked online merchants and sold stolen payment card data, abruptly closed up shop last week. The proprietors of the popular store said their servers were seized as part of a coordinated law enforcement operation designed to disconnect and confiscate its infrastructure.

The post ‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered appeared first on Security Boulevard.

Read More

The post ‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered-3/?utm_source=rss&utm_medium=rss&utm_campaign=validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered-3

BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/bsidessf-2020-jay-jacobss-visualizing-security/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-jay-jacobss-visualizing-security

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...