Data-driven Defence Evangelist
KnowBe4

BIO:

Data-driven Defence Evangelist

Articles and Comments By Roger Grimes

Expert Commentary
15+ Car Manufacturers’ Exploitable in API Vulnerabilities
January 06 , 2023 by Roger Grimes
"Cars are now full of computers. Some people say they are computers who just happen to travel a lot....
Expert Commentary
Is Ransomware responsible for the recent hit on Guardian?
December 23 , 2022 by Roger Grimes
"It's good to hear that The Guardian is not impacted so much that it will prevent them from publishi...
Expert Commentary
Fifth Of 18 To 34-year-olds Have Fallen Victim To Financial Scams
November 09 , 2022 by Roger Grimes
Regardless of the results of this particular survey, the key message that we should be sharing is th...
Expert Commentary
Lloyds Of London Ends Insurance Coverage For State Cyber Attacks, Expert Weighs In
August 22 , 2022 by Roger Grimes
My best guess is that Lloyds doesn't want to be held accountable for very large ransomware/wiperware...
Expert Commentary
Cyberattack Blocks Albania’s Public Online Services
July 19 , 2022 by Roger Grimes
"History has shown over and over that country governments are not immune to cyberattacks. And it's n...
Expert Commentary
CISA Releases Directive For US Agencies To Address Software Vulnerabilities
November 04 , 2021 by Roger Grimes
What CISA is doing is great! They are to be applauded. They are doing a few things that I think are...
Expert Commentary
Emotet Took Down A Network By Overheating All Computers - Expert Reaction
April 06 , 2020 by Roger Grimes
That it occurred because of a single phishing email is not strange. Seventy to ninety percent of all...
Expert Commentary
Experts Insight On Chubb Ins. Reports 2019 Ransomware Attacks Outpacing 2018
March 30 , 2020 by Roger Grimes
The vast majority of ransomware attacks are due to one of two things: a phishing email or unpatched...
Expert Commentary
Tech Giant GE Discloses Data Breach - Experts Reaction
March 24 , 2020 by Roger Grimes
While I’m usually a bit numb to the latest data breach, the sheer variety of exposed information i...
Expert Commentary
Phishing Experts On Norton LifeLock Phishing Scam Installs Remote Access Trojan
February 28 , 2020 by Roger Grimes
This is another great example of sophisticated phishing that bypasses many technical security contro...
Expert Commentary
Cypress WiFi Chips Leak Sensitive Info Due To Kr00k Bug In Broadcom - Experts Insight
February 27 , 2020 by Roger Grimes
I\'m normally a skeptic on most announced vulnerabilities. Most are too over hyped. This one isn\'t....
Expert Commentary
Clearview AI's Entire Client List Stolen In Data Breach - Experts Reaction
February 28 , 2020 by Roger Grimes
It’s unclear what “unauthorized access” means, and I’m just guessing, but the general contou...
Expert Commentary
WHO Warns Of Coronavirus Phishing Attacks - Experts Comments
February 19 , 2020 by Roger Grimes
This is among the most common hacking tactics- using a newsworthy event along with a “stressor eve...
Expert Commentary
Email-Based Extortion Scheme Targets Web Site Owners Using Google’s AdSense Program - Security Awareness Experts Insight
February 18 , 2020 by Roger Grimes
This is a very interesting attack – a new approach and I don’t see much that surprises me often...
Expert Commentary
Experts Analysis Of Backdoor Campaign Targetting US Financial Sector
February 10 , 2020 by Roger Grimes
It’s no surprise that most of these attacks are coming from social engineering attacks. Seventy to...
Expert Commentary
Experts On Study Finds Red Teams OK To Push Ethical Limits But Not On Themselves
February 04 , 2020 by Roger Grimes
My biggest concern with red teams is how accurately they reflect the real risks and threats to the o...
Expert Commentary
Experts On Study Finds Red Teams OK To Push Ethical Limits But Not On Themselves
February 04 , 2020 by Roger Grimes
My biggest concern with red teams is how accurately they reflect the real risks and threats to the o...
Expert Commentary
Experts On Study Finds Red Teams OK To Push Ethical Limits But Not On Themselves
February 04 , 2020 by Roger Grimes
My biggest concern with red teams is how accurately they reflect the real risks and threats to the o...
Expert Commentary
Microsoft Issues Excel Security Alert After Detecting New TA505 Malware Attacks
February 03 , 2020 by Roger Grimes
This attack may be new for this particular threat actor, but it’s been used for decades by other g...
Expert Commentary
Microsoft Exposes 250M Customer Support Records On Leaky Servers - Experts Comments
January 23 , 2020 by Roger Grimes
This is a fairly common type of hack. Overly permissive permissions abound on servers and cloud prod...
Expert Commentary
Jeff Bezos' Phone Hacked By Saudi Crown Prince - Expert Comments
January 23 , 2020 by Roger Grimes
I can’t speak to the absolute particulars of the incident. It does seem strange that the Saudi Cro...
Expert Commentary
2020 Cybersecurity Landscape: 100+ Experts' Predictions
December 21 , 2019 by Roger Grimes
Social engineering and unpatched software will remain the top two root causes for successful exploit...
Expert Commentary
Experts Comments On French Online Fashion Store Sixth June Hacked
October 29 , 2019 by Roger Grimes
The Sixth June credit card stealing trojan is a fairly common technique for today’s malicious hack...
Expert Commentary
Expert On Spelevo Exploit Kit & Maze Ransomware
October 22 , 2019 by Roger Grimes
Easily the most disturbing part about this story is malicious individuals and organizations setting...
Expert Commentary
Experts Insight on Pitney Bowes Ransomware Attack
October 15 , 2019 by Roger Grimes
The shipping industry has been a pretty big target ever since the NotPetya ransomware attack on Maer...
Expert Commentary
Security Experts Perspective On Quantum Supremacy Posting By Google
September 24 , 2019 by Roger Grimes
We don’t know exactly what this means because Google posted the announcement of them reaching quan...
Expert Commentary
Millions Of Lion Air Passenger Records Breached - Expert Commentary
September 20 , 2019 by Roger Grimes
It’s likely that hundreds of thousands of companies have the same cybersecurity issue as Lion Air....
Expert Commentary
Commenst On Magecart Skimming Attack Targets Mobile Users Of Hotel Chain Booking Websites
September 19 , 2019 by Roger Grimes
This is a combination of two major attack types: credit card skimming malware and a “supply chain...