Information security, traditionally focused on technical defenses against digital intrusions, is increasingly grappling with threats that exploit human vulnerabilities, particularly in intelligence gathering and economic espionage. Modern adversaries are employing sophisticated social engineering tactics that leverage personal circumstances to gain access to sensitive information. A recent Reuters report highlights a concerning development: a secretive Chinese Read More …
Category: News
Hacker TV – The Future of Technology at Microsoft
Satya Nadella – The Future of Technology at Microsoft
North Korea infiltrates crypto markets
N. Korea infiltrates crypto markets Google Gemini However, I can provide you with general information about North Korea’s involvement in the cryptocurrency industry, which is a widely reported topic: Sanctions Evasion: North Korea faces strict international sanctions due to its nuclear weapons program. Cryptocurrency offers a way to bypass traditional financial systems and evade these Read More …
Some fun AWS reads
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/ Capturing Exposed AWS Keys During Dynamic Web Application Tests https://www.praetorian.com/blog/capturing-exposed-aws-keys-during-dynamic-web-application-tests/ AWS Network Firewall egress filtering can be easily bypassed https://canglad.com/blog/2023/aws-network-firewall-egress-filtering-can-be-easily-bypassed/
News :: AT&T Breached again…..
article Another example of sprawling clouds maybe? Security 101 – You have to know what you have. /snark over
Unmasking a CIA Criminal
Hacker video of the week……
PXE Server for the win
Recently I got a new ‘hot rod’ of a laptop from work, which came with many of the latest bells and whistles. One of these newest bells, was a very much updated BIOS, that no longer allowed for Legacy Boot Options. Important for those of us who might want to use something other than Windows Read More …
Infrastructure Attacks Are Growing
A couple of news articles caught my eye this past week that are quite interesting IMO. Ukraine’s largest mobile operator Kyivstar downed by ‘powerful’ cyberattack & Attacks on Critical Infrastructure Attributed to Insidious Taurus You have to love the names that the security companies come up with for the other nation state actors. I am Read More …
Find an APT
MITRE Groups Thai CERT – Electronic Transactions Development Agency