Let's Encrypt is set to become a mainstream, self-certifying web certificate authority - here's why it took so many years.
Read moreExcellent Write-up of the SolarWinds Security Breach
August 30 2021Robert Chesney wrote up the Solar Winds story as a case study, and it’s a really good summary.
Read moreSurveillance of the Internet Backbone
August 25 2021
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used...
Read moreREvil is Off-Line
July 16 2021
This is an interesting development:
Just days after President Biden demanded that President Vladimir V. Putin of Russia shut down ransomware groups attacking American targets, the most aggressive of...
Read more
China Taking Control of Zero-Day Exploits
July 14 2021
China is making sure that all newly discovered zero-day exploits are disclosed to the government.
Under the new rules, anyone in China who finds a vulnerability must tell the...
Read more
Iranian State-Sponsored Hacking Attempts
July 13 2021
Interesting attack:
Masquerading as UK scholars with the University of London’s School of Oriental and African Studies (SOAS), the threat actor TA453 has been covertly approaching individuals since at...
Read more
More Russian Hacking
July 2 2021
Two reports this week. The first is from Microsoft, which wrote:
As part of our investigation into this ongoing activity, we also detected information-stealing malware on a machine belonging...
Read more
Insurance and Ransomware
July 1 2021
As ransomware becomes more common, I’m seeing more discussions about the ethics of paying the ransom. Here’s one more contribution to that issue: a research paper that the...
Read moreRisks of Evidentiary Software
June 29 2021
Over at Lawfare, Susan Landau has an excellent essay on the risks posed by software used to collect evidence (a Breathalyzer is probably the most obvious example).
Bugs...
Read moreThe Future of Machine Learning and Cybersecurity
June 21 2021
The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line:
The report offers four conclusions:
- Machine learning can... Read more
Recent Comments