The French Government sees the massive number of PlugX infections as a national threat. PlugX is malware used by Nation State threat actors to get inside networks. Sekoia was part of a sinkholing action that uncovered thousands of locations where PlugX is deployed. Should you be concerned? How do you discover if you have a Read More
Category: Threat Actors
Threat Actors are people who are acting counter to you or your organization’s interest. They are a threat to yourself, your family, your community, your organization (company), your society, and your nation. They cannot be taken for granted. You can classify the world in the four key threat actor categories:
- Cyber-Criminal Threats – Cyber-Crime is an International Legal problem that has no short term resolution. There will always be someplace in the world that is a harbor for cyber-criminal activity.
- Nation State Threats – Post-Snowden, the secret world of nation-state security is now all in the open. Your network is a valid “Battle Space” for any Cyber-War.
- Political, Patriotic, Protestors (P3) – There are always going to be someone, somewhere, who is upset with society – with the ability to make their anxiety know through any network – anywhere.
- Corporate Threats (New!) – The dialog between US & China will accelerate the corporate on corporate threat vector.
Industry Anti-DDOS Strategy 2018
Note to the Readers …… Yes, there are communities who consult and curate an anti-DDoS strategy to mitigate the risk to the Internet. Starting ~2000, Operators have consulted on ways to build better resilience into the Internet’s infrastructure. These consultations evolved into informal security strategy plans. By 2012, multiple groups were involved (see http://www.senki.org/2012-a-year-of-cyber-security-optimism/). A Read More
Perhaps it is time to admit that the ladder is on the wrong wall
I’m reading Paul Vixie’s Magical Thinking in Internet Security. I 100% agree with everything Paul is pointing out. We’ve had many conversations about these challenges in the past. But I’m now at a point where I’m looking in the mirror and realizing what we’re doing might be the wrong approach. I’m exasperated at the persistent Read More
Optimize Shadowserver’s Value – Checklist
Optimize Shadowserver’s value! Stop the Threat Actors! You are at risk if you get any of the +120 daily reports. Most issues are easily fixed. All these reports share details the threat actor can potentially exploit. Take 15 minutes once a quarter to update your contacts, ASNs, IPs, Domain, APIs, and other details. Quarterly Reviews Read More
Thanksgiving Holiday Fun! Five Eyes Warn of LockBit 3.0 Ransomware!
Do you know if your network is vulnerable to LockBit 3.0 Ransomware crew getting into your network via NetScaler CVE-2023-4966 vulnerability? Boeing – a company with a powerful cybersecurity team – was penetrated by the LockBit crews using CVE-2023-4966. Is this your Thanksgiving holiday fun? For those subscribed to Shadowserver free Cyber Civil Defence reporting, Read More
New SLP DDoS amplification can overload your network
Happy Tuesday – It is the RSA conference week. That means we get vendors disclosing vulnerabilities while people are at the conference. Bitsight and Curesec uncovered a Service Location Protocol (SLP) DDoS Amplification that can be as high as 2200:1. That means an open SLP port on your network can … CISA has posted an Read More
Welcome to CyberWar & LongTerm Ramification Unleashed by Russia’s War
Cyberwar is today’s reality. We’ve moved from a world of cyber-criminal threats to an interconnected arena where any malicious activity is feasible. Cyber-Kinetic attacks that destroy, kill, and massively disrupt civil society are part of our new security threat landscape reality. Geography will not help. The massively interconnected Internet means that you are a cyberwarrior’s
Birthday Wish – Three Cybersecurity Precautions
Thank you for remembering me on my birthday. I hope the year will be prosperous and loving for all. Some people ask what is my birthday wish. This year I’m going to try something different. I’m going to ask all my friends and family to take a minute and invest to protect themselves to cybersecurity Read More
Practical Security Guides, References, & Workbooks
Do you feel overwhelmed by the barrage of security white papers, webinars, and guides? Are you parallized trying to figure out what you need to do first to get ready for the next attack? We don’t need more security guides, we need a consolidated landing that pulls in all the advice into one place. We
Why are you leaving your SNMP ports open to the world?
Too many organizations are ignoring the risk of SNMP abuse and leaving their SNMP ports open to the world. Simple Network Manage Protocol (SNMP) is one of our core networking building blocks. We – the community who build and run networks – use all types of networks. It is a powerful tool for monitoring, managing, Read More