Malware Devil

Sunday, February 28, 2021

BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Josh Sokol’s ‘Architecting For Security In The Cloud’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/bsides-calgary-2020-josh-sokols-architecting-for-security-in-the-cloud/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-josh-sokols-architecting-for-security-in-the-cloud

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics

Permalink

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’ appeared first on Security Boulevard.

Read More

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 318’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/robert-m-lees-jeff-haas-little-bobby-comics-week-318/?utm_source=rss&utm_medium=rss&utm_campaign=robert-m-lees-jeff-haas-little-bobby-comics-week-318

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. From accessing your business-critical resources and sensitive information to halting business operations and services, a malware infection can quickly become an organization’s … (more…)

The post GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce appeared first on Security Boulevard.

Read More

The post GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/guest-essay-everyone-should-grasp-these-facts-about-cyber-threats-that-plague-digital-commerce/?utm_source=rss&utm_medium=rss&utm_campaign=guest-essay-everyone-should-grasp-these-facts-about-cyber-threats-that-plague-digital-commerce

BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Jason Maynard’s ‘Security Can Do Better: Think Security Architecture’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/bsides-calgary-2020-jason-maynards-security-can-do-better-think-security-architecture/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-jason-maynards-security-can-do-better-think-security-architecture

Weekly News Roundup — February 21 to February 27

Hello and welcome to Sec Soup, where the weekly newsletter has a collection of infosec links to Tools & Tips, Threat Research, and more! The focus trends toward DFIR and threat intelligence, but general information security and hacking-related topics are included as well. This list is not vetted nor intended to be an exhaustive source. Keeping up with the enormous volume of security-related information is a daunting task, but this is my way of filtering the most useful items and improving the signal to noise ratio. Happy Reading!

Industry Reports, News, and Miscellany

Threat Research 

Tools and Tips

Breaches, Government, and Law Enforcement 

Vulnerabilities and Exploits

Read More

The post Weekly News Roundup — February 21 to February 27 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/weekly-news-roundup-february-21-to-february-27/?utm_source=rss&utm_medium=rss&utm_campaign=weekly-news-roundup-february-21-to-february-27

Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021

Identity Management Day aims to educate and engage business leaders,  IT decision makers and consumers on the importance of managing and securing digital identities   DENVER, Feb. 23, 2021 — The Identity Defined Security Alliance (IDSA), a nonprofit that provides vendor-neutral education and resources to help organizations reduce the risk of a breach by combining..

The post Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021 appeared first on Security Boulevard.

Read More

The post Identity Defined Security Alliance Partners with National Cyber Security Alliance to Launch First-Ever ‘Identity Management Day’ April 13, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/identity-defined-security-alliance-partners-with-national-cyber-security-alliance-to-launch-first-ever-identity-management-day-april-13-2021-4/?utm_source=rss&utm_medium=rss&utm_campaign=identity-defined-security-alliance-partners-with-national-cyber-security-alliance-to-launch-first-ever-identity-management-day-april-13-2021-4

Why Do Chief Security Officers Leave Jobs So Often?

Is it time to look elsewhere? Everyone knows that cybersecurity is a red-hot career field, and chief security officers (or chief information security officers in many organizations) are the ones leading the online security defense. So how can we explain the current situation where about 24 percent of Fortune 500 CISOs last just one year,..

The post Why Do Chief Security Officers Leave Jobs So Often? appeared first on Security Boulevard.

Read More

The post Why Do Chief Security Officers Leave Jobs So Often? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/28/why-do-chief-security-officers-leave-jobs-so-often/?utm_source=rss&utm_medium=rss&utm_campaign=why-do-chief-security-officers-leave-jobs-so-often

Clubhouse App and Your Privacy

Everyone is talking about the Clubhouse app but what should you be concerned about from a privacy perspective? In our February monthly show, Tom and Scott discuss what all the hype is about and what you need to know if you happen to receive a Clubhouse invite! ** Links mentioned on the show ** Join […]

The post Clubhouse App and Your Privacy appeared first on The Shared Security Show.

The post Clubhouse App and Your Privacy appeared first on Security Boulevard.

Read More

The post Clubhouse App and Your Privacy appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/clubhouse-app-and-your-privacy/?utm_source=rss&utm_medium=rss&utm_campaign=clubhouse-app-and-your-privacy

Saturday, February 27, 2021

BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – James Harrison’s ‘How To Pick A Pocket’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/bsides-calgary-2020-james-harrisons-how-to-pick-a-pocket/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-james-harrisons-how-to-pick-a-pocket

XKCD ‘Post-Pandemic Hat’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Post-Pandemic Hat’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Post-Pandemic Hat’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/27/xkcd-post-pandemic-hat/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-post-pandemic-hat

Friday, February 26, 2021

NSA Releases Guidance on Zero-Trust Architecture

A new document provides guidance for businesses planning to implement a zero-trust system management strategy.

The National Security Agency (NSA) today published a document to explain the zero-trust model and its benefits, challenges involved with implementation, and advice to navigate the process.

As cloud, multicloud, and hybrid network environments become the norm for businesses, the resulting complexity, combined with evolving threats, puts many at risk. Traditional perimeter-based network defenses with layers of security tools are often insufficient. Companies need a better way to protect infrastructure and provide granular access to data, services, and apps.

“The Zero Trust security model eliminates implicit trust in any one element, node, or service and instead requires continuous verification of the operational picture via real-time information fed from multiple sources to determine access and other system responses,” NSA officials wrote.

Zero trust requires strong authentication for both user and device identities. Use of multifactor authentication, which is recommended in this model, can make credential theft more difficult.

The implementation of zero trust takes time and effort, but it doesn’t have to be done all at once. Many businesses may be able to incorporate zero-trust concepts into existing network infrastructure; however, the transition to a mature architecture often requires additional capabilities. Officials advise planning out the integration as a “continually maturing roadmap,” starting with initial preparation and continuing on to basic, intermediate, and advanced stages.

As with all major projects, there are challenges. Officials note potential roadblocks include lack of support from enterprise leadership or users. If leadership isn’t willing to provide the needed resources to sustain a zero-trust architecture, or users are allowed to bypass policies, then zero trust won’t prove beneficial, they say.

Read the full document here for more details.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment |

Email This |

Print |

RSS

More Insights

Webcasts
More Webcasts

The post NSA Releases Guidance on Zero-Trust Architecture appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/nsa-releases-guidance-on-zero-trust-architecture/?utm_source=rss&utm_medium=rss&utm_campaign=nsa-releases-guidance-on-zero-trust-architecture

Sete práticas de segurança cibernética que toda organização deveria implementar

Os dados são claros: houve um aumento de 25% nos ataques de ransomware no primeiro trimestre de 2020 em comparação com o quarto trimestre de 2019. Outros, como ataques de phishing e ataques de negação de serviço distribuído (DDoS), também …

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on ManageEngine Blog.

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on Security Boulevard.

Read More

The post Sete práticas de segurança cibernética que toda organização deveria implementar appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/sete-praticas-de-seguranca-cibernetica-que-toda-organizacao-deveria-implementar/?utm_source=rss&utm_medium=rss&utm_campaign=sete-praticas-de-seguranca-cibernetica-que-toda-organizacao-deveria-implementar

Evolução da cibersegurança: Uma breve linha do tempo

A evolução da cibersegurança acompanhou o desenvolvimento da tecnologia da comunicação. À medida que progredíamos de telégrafos para os smartphones, o mesmo aconteceu com os ataques cibernéticos, do worm Morris ao Stuxnet e, mais recentemente, Snake ransomware. Percorremos um longo

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on ManageEngine Blog.

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on Security Boulevard.

Read More

The post Evolução da cibersegurança: Uma breve linha do tempo appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/evolucao-da-ciberseguranca-uma-breve-linha-do-tempo/?utm_source=rss&utm_medium=rss&utm_campaign=evolucao-da-ciberseguranca-uma-breve-linha-do-tempo

Um dia na vida de um analista SOC

Um analista de centro de operações de segurança (SOC) é parte integrante de uma equipe responsável por mantera empresa protegida contra crimes cibernéticos. O analista SOC é um profissional de segurança que lida com as coisas boas e ruins, detectando …

The post Um dia na vida de um analista SOC appeared first on ManageEngine Blog.

The post Um dia na vida de um analista SOC appeared first on Security Boulevard.

Read More

The post Um dia na vida de um analista SOC appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/um-dia-na-vida-de-um-analista-soc/?utm_source=rss&utm_medium=rss&utm_campaign=um-dia-na-vida-de-um-analista-soc

Google to Underwrite Contributors to Linux Security

Linux security XDR open source security

Google and the Linux Foundation announced this week they will underwrite two full-time maintainers for Linux kernel security development. Gustavo Silva is currently working full time on eliminating several classes of buffer overflows by transforming all instances of zero-length and one-element arrays into flexible-array members, which is the preferred and least error-prone mechanism to declare..

The post Google to Underwrite Contributors to Linux Security appeared first on Security Boulevard.

Read More

The post Google to Underwrite Contributors to Linux Security appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/google-to-underwrite-contributors-to-linux-security/?utm_source=rss&utm_medium=rss&utm_campaign=google-to-underwrite-contributors-to-linux-security

‘Nerd’ Humor

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


The post ‘Nerd’ Humor appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/nerd-humor/?utm_source=rss&utm_medium=rss&utm_campaign=nerd-humor

The Edge Pro Tip: Fasten Your Seatbelts

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


2/26/2021
02:50 PM
image

image

An unprecedented 2020 has shaken up security leaders’ usual list of must-have technologies for 2021. Where do they plan to spend next?

Read more about security leaders’ spending priorities here.

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Cartoon Caption Winner: Be Careful Who You Trust

The post The Edge Pro Tip: Fasten Your Seatbelts appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/the-edge-pro-tip-fasten-your-seatbelts-2/?utm_source=rss&utm_medium=rss&utm_campaign=the-edge-pro-tip-fasten-your-seatbelts-2

Securing Super Bowl LV

A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.
(image by detakstudio, via Adobe Stock)

(image by detakstudio, via Adobe Stock)

Protecting the Super Bowl from cyberattackers is no small task. In fact, it’s a sprawling, messy mass of challenges converging on a day when (almost) 100 million people are watching.

This year, much of the job fell to ReliaQuest, the official cybersecurity partner for both the Tampa Bay Buccaneers and the NFL Super Bowl LV Host Committee. ReliaQuest CEO Brian Murphy and CTO Joe Partlow lay out the tasks:

Protecting the stadium’s wireless access points and payment systems. Defending the scoreboard from vandalism and sad fans hoping to change the score. Locking down the volunteer staff’s background checks and COVID screening info. Securing coaches’ tablets and comms so their playbooks and play-calling are kept confidential. Making sure injury reports, starting lineups, and other valuable data aren’t leaked to the competition and the gambling public early. The list goes on. It means monitoring threat intelligence reports, scraping social media, shifting defense to respond to shifting threats.

(And, hopefully, doing so as effectively as the Buccaneers’ defense was against the Kansas City Chiefs’ attacks in the Bucs’ 31-9 victory that night.)

It would be a big undertaking in any year, for sure, but in 2021 the pandemic created new challenges, Murphy and Partlow explain.

Attendance in the stadium at Super Bowl LX was slashed from 62,000 to 22,000, but the bigger change affecting infosec was in the viewership outside of the stadium.

“‘Watch parties weren’t happening,” Murphy explains.

Usually, he says, people gather to watch the game, at restaurants, bars, and friends’ houses with big-screen TVs. This year, instead, people were watching alone, at home, on a variety of devices.

The result: Although the overall viewership ratings were the lowest for a Super Bowl since 2006, live-streaming viewership rocketed up by 65%, according to CBS.

Expecting the bump in online viewers, ReliaQuest also expected an accompanying bump in overall security events leading up to and during the game. The company hypothesized that its overall customer base might experience more attacks during the 2021 Super Bowl than in 2020.

They were right: In fact, ReliaQuest detected a 20.2% increase in total security events, year over year. There were upticks in phishing and ransomware attacks. The most noteworthy change was the increase in malicious streaming services, luring victims with promises like, “Watch the Super Bowl for free! Just download here.”

Defending against the wide variety of threats related to the event requires an array of intelligence, detection, and response tools – security information and event management (SIEM), endpoint detection and response (EDR), and threat intelligence, for starters, and in in this case, pulled together by an extended detection and response product (XDR). Partlow and Murphy explain that their company’s XDR offering is an “open XDR” technology. By “open,” they mean the XDR is vendor-agnostic. It integrates security tools from a variety of security companies – some Carbon Black here, some Tenable there, etc.

This approach can also, for example, simplify a merger or acquisition, Partlow explains.

“Each company probably chose their security tools for a good reason,” he says, “As that [merged] enterprise, I don’t have to rip-and-replace and make it all one logo.”

Although bruised-up Chiefs quarterback Patrick Mahomes might disagree, attacks on Super Bowl Sunday were handled without major incident – “aside from the streaker,” says Partlow. But that, he notes,”was a physical security breakdown.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Securing Super Bowl LV appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/securing-super-bowl-lv-2/?utm_source=rss&utm_medium=rss&utm_campaign=securing-super-bowl-lv-2

Lazarus Targets Defense Companies with ThreatNeedle Malware

A spear-phishing campaigned linked to a North Korean APT uses “NukeSped” malware in cyberespionage attacks against defense companies.
Read More

The post Lazarus Targets Defense Companies with ThreatNeedle Malware appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/lazarus-targets-defense-companies-with-threatneedle-malware/?utm_source=rss&utm_medium=rss&utm_campaign=lazarus-targets-defense-companies-with-threatneedle-malware

The Edge Pro Tip: Fasten Your Seatbelts

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


2/26/2021
02:50 PM
image

image

An unprecedented 2020 has shaken up security leaders’ usual list of must-have technologies for 2021. Where do they plan to spend next?

Read more about security leaders’ spending priorities here.

The Edge is Dark Reading’s home for features, threat data and in-depth perspectives on cybersecurity. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

Cartoon Caption Winner: Be Careful Who You Trust

The post The Edge Pro Tip: Fasten Your Seatbelts appeared first on Malware Devil.



https://malwaredevil.com/2021/02/26/the-edge-pro-tip-fasten-your-seatbelts/?utm_source=rss&utm_medium=rss&utm_campaign=the-edge-pro-tip-fasten-your-seatbelts

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...