Having put it off for far too long, I’m belatedly trying to catch up with some standards work in the area of Root of Trust, which for me meant starting with the basics, studying simple introductory articles about RoT.As far as I can tell so far, RoT i…
Defensive Security Podcast Episode 268
Stories: https://www.scmagazine.com/feature/incident-response/why-solarwinds-just-may-be-one-of-the-most-secure-software-companies-in-the-tech-universe https://www.computerweekly.com/news/252522789/Log4Shell-on-its-way-to-becoming-endemic https://www.bleepingcomputer.com/news/security/hackers-impersonate-cybersecurity-firms-in-callback-phishing-attacks/ https://www.cybersecuritydive.com/news/microsoft-rollback-macro-blocking-office/627004/ jerry: [00:00:00] All right, here we go today. Sunday, July 17th. 2022. And this is episode 268. Of the defensive security podcast. My name is Jerry Bell and joining me tonight as always is Mr. Andrew Kellett. Andy: Hello, Jerry. How are you, sir? jerry: great. How are you … Continue reading “Defensive Security Podcast Episode 268”
‘Space is where we need to go’: US Air Force preparing networked infrastructure for new mission
The two services have been conducting reviews and meeting with industry over the last year to define their distinct roles in providing tactical intelligence, surveillance and reconnaissance capabilities and develop a plan for a space-based ground moving target indicator capability.
Average American Accesses Suspicious Sites 6.5 Times a Day
The survey highlights significant security oversights in the general population
Putin makes changes to arms industry, space agency leadership
The reshuffle follows reported flaws and deficiencies in Russian weapons programs highlighted by the military action in Ukraine.
DHS Releases Report into Log4j Vulnerabilities and Response
The analysis provides fresh insights into the notorious Log4j vulnerability
North Korean Threat Actor Targeting SME Businesses with Ransomware
The group, going by the name H0lyGh0st, has been developing and conducting cross-national malware attacks for over a year
Falling Cryptocurrency Market Stalling Cybercrime Activity
Falling cryptocurrency prices are making it harder for threat actors to monetize their attacks
Firms Not Planning for Supply Chain Threats
Boards underestimate cyber risks from outside their organizations, report suggests
Financial Firms Failing to Fix Authentication Breaches
Four in five breaches down to compromised credentials, research finds