howto
So you're being targeted by a phishing campaign
Resources & references on where to report phishing attempts
our daily breach
Internet Archives is under attack... again. Hackers love this single trick to maintain persistence.
howto
Building a cybersecurity program from the ground up is hard. This series of articles will present ways of establishing your cybersecurity program the right way.
our daily breach
I didn't want to write this post. I was Space Forced to.
our daily breach
FBI hacker 'USDoD' struggles with his own data breach. I mean... it's kind of funny.
our daily breach
Bad dog! No hacking the SEC!
our daily breach
Fidelity rewards customer loyalty by sharing the private identities of 77,000 customers. American Income Life Insurance is being extorted.
Welcome back to another thrilling day of infosec management. Today we are going to take everything we learned in part 1 and turn it into a fearsome tool you can use to impress your friends, motivate your team, and banish your auditors back to their dark domain. I'm
our daily breach
Chinese researchers weaken RSA encryption with quantum computing.
our daily breach
First rule of Casio club is you don't talk about data breaches. The second rule of Casio club...
Cybersecurity Truths
Back in the day, I was a pretty avid Google Reader user. For those of you too young to remember it, Google Reader was a very cool thing: it was an RSS reader, but it was also a social reader because people could follow you and see what kind of
It's a happy Canadian Thanksgiving for everyone except the libraries of Calgary.
The Internet Archive gets DDoS'd and breached by hacktivist group. The rage is palpable.
Gasp! Comcast lied about the impact of its data breach.
ADT files 8-K disclosing a breach of employee data. The company goes on a journey believing that no client is impacted.
Credit Monitoring firm CreditRiskMonitor gets breached. Quis custodiet ipsos custodes?
Depending on who you ask, bouncing back from ransomware attacks will cost organizations anywhere from 5 to 20 million US dollars. That's not loose change, but that's nothing that will make a dent on the bottom line of a significant number of organizations. If you do
Today’s breach may not be breaking news, but it will likely be remembered as one of the most monumental cybersecurity fiascos in corporate history. National Public Data (NPD) had already earned a top spot on the scoreboard of shame for leaking the names, addresses, phone numbers, and, in some
Today's story is a tale of two breaches. From January to July 2022, two file directories were publicly available on the internet. Anyone with the right URL could have casually browsed the deeply personal health information of 600,000 inmates across California, Georgia, Louisiana, and South Carolina. These
A well-organized cyber security incident response (IR) program can certainly make the difference between a bad day and a bad week in the face of a serious incident, but with some extra work up front you can set yourself up for great metrics and reporting programs, organized alert tuning, and
In the near-empty convenience store, an elderly Quebecois man shouts into his phone, his voice a mix of desperation and frustration. “My love, I need that money you promised me!” His words echo off the shelves, disrupting the quiet. He pulls the phone away from his ear, covering it with
"Give us each day Our Daily Breach, and forgive us our sins of unrestricted access for all employees. Lead us not into the temptation to repeat the failures of those we chronicle." After two weeks of reviewing the evidence, a federal jury convicted former Epsilon Data Management senior