Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Patrick Hamilton
Security Evangelist feature_status*/ ?>
Lucy Security

Comments Dotted : 7
July 29, 2020

Investment Industry Ransomware Attack – Expert Comments

Networks never assume trust but humans do.
Ransomware attacks are rarely predicated upon a vulnerability within a network. Nine times out of 10 these attacks are predicated upon the vulnerability of humans. Networks never assume trust but humans do. Humans trust names that they’ve seen before, shared vendors, common connections, and on and on. Humans are the real endpoints, access points, and lowered defenses. Train humans, reduce risk.
Like(2)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Networks never assume trust but humans do...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/investment-industry-ransomware-attack-expert-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Networks never assume trust but humans do...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/investment-industry-ransomware-attack-expert-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 08, 2020

Expert Reaction On Cosmic Lynx 200 BEC Attacks Responsible For More Than 200 BEC Attacks Against Multinational Corporations

Train your staff now to avoid falling prey to these cybercriminals in the near future.
The good news— less than 300 companies remain on the Fortune 500 for Cosmic Lynx to attack. The bad news—they're all behind the game because they think it won’t happen to them. No one is immune to BEC attacks, but anyone can be prepared. Train your staff now to avoid falling prey to these cybercriminals in the near future. Training is proven to decimate the risk. Let’s play a game of "would you rather." Would you rather: a) Spend a little now to dramatically reduce your risk of being.....Read More
The good news— less than 300 companies remain on the Fortune 500 for Cosmic Lynx to attack. The bad news—they're all behind the game because they think it won’t happen to them. No one is immune to BEC attacks, but anyone can be prepared. Train your staff now to avoid falling prey to these cybercriminals in the near future. Training is proven to decimate the risk. Let’s play a game of "would you rather." Would you rather: a) Spend a little now to dramatically reduce your risk of being victimized, or b). Spend a fortune later to recover from these specialized attacks?  Read Less
Like(0)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Train your staff now to avoid falling prey to these cybercriminals in the near future...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-cosmic-lynx-200-bec-attacks-responsible-for-more-than-200-bec-attacks-against-multinational-corporations

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Train your staff now to avoid falling prey to these cybercriminals in the near future...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-cosmic-lynx-200-bec-attacks-responsible-for-more-than-200-bec-attacks-against-multinational-corporations

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
June 10, 2020

Experts Insight On Honda Confirms Its Network Has Been Hit By Cyberattack

The ransom note is written in nearly perfect English, rare form for threat actors.
Japanese companies are renowned for tight control and shipshape order. Creators of the new Snake ransomware may have one-upped Honda. The ransom note is written in nearly perfect English, rare form for threat actors. The threat uses sophisticated marketing psychology—almost like reading a friendly message from Amazon. How did venomous malware infiltrate such a tightly controlled organization? Probably email—the path of least resistance anywhere. It seems like a stroll through the park and.....Read More
Japanese companies are renowned for tight control and shipshape order. Creators of the new Snake ransomware may have one-upped Honda. The ransom note is written in nearly perfect English, rare form for threat actors. The threat uses sophisticated marketing psychology—almost like reading a friendly message from Amazon. How did venomous malware infiltrate such a tightly controlled organization? Probably email—the path of least resistance anywhere. It seems like a stroll through the park and instantly turns into a treacherous swamp.  Read Less
Like(1)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The ransom note is written in nearly perfect English, rare form for threat actors. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-honda-confirms-its-network-has-been-hit-by-cyberattack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The ransom note is written in nearly perfect English, rare form for threat actors. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-honda-confirms-its-network-has-been-hit-by-cyberattack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
April 03, 2020

Security Expert Re: Key Ring Exposes 44 M Digital Wallet Items Due To AWS S3 Bucket Misconfiguration

Developers can take "minimum viable product" to mean "does this work".
Developers can take "minimum viable product" to mean "does this work" -- they often forget to add security into their viability equation. For Key Ring, it seems overly simple to say basic security hygiene means following the instructions that came with your S3 bucket. As for Key Ring users, there's a minimum cost of convenience: they will now have to be hyper vigilant with every email they receive. Phishing attacks with this level of information will easily get past firewalls.
Like(0)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Developers can take \"minimum viable product\" to mean \"does this work\"...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-re-key-ring-exposes-44-m-digital-wallet-items-due-to-aws-s3-bucket-misconfiguration

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Developers can take \"minimum viable product\" to mean \"does this work\"...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-expert-re-key-ring-exposes-44-m-digital-wallet-items-due-to-aws-s3-bucket-misconfiguration

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
March 30, 2020

Security Experts Re: Ryuk Ransomware Targets Hospitals

Cybercriminals don’t care whether you survive COVID-19 or not.
Cybercriminals don’t care whether you survive COVID-19 or not. They care about one thing: gaining from your exposure. We know how stop these guys because we know lack of awareness is the greatest vulnerability.
Like(1)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cybercriminals don’t care whether you survive COVID-19 or not...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-re-ryuk-ransomware-targets-hospitals

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cybercriminals don’t care whether you survive COVID-19 or not...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-re-ryuk-ransomware-targets-hospitals

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 19, 2020

WHO Warns Of Coronavirus Phishing Attacks – Experts Comments

The people that think they are safe are the most vulnerable.
It would be so easy to get wrapped in security blankets like zero-trust environments, but beware of being lulled into a sense of security. The people that think they are safe are the most vulnerable. You can trust the World Health Organization (WHO), can’t you? Not if they are the bad guy masquerading as the WHO. Don’t rely on a machine to tell you who to trust.
Like(0)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The people that think they are safe are the most vulnerable. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/who-warns-of-coronavirus-phishing-attacks-expert-comments

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The people that think they are safe are the most vulnerable. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/who-warns-of-coronavirus-phishing-attacks-expert-comments

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
February 13, 2020

Security Experts Analysis Of FBI Crime Report

Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable.
It’s well known that email is the most frequent form of attack, it’s well known that email is most easily compromised, and it’s well known that scammers rely on deception. Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable: being in a rush, being stressed out, losing focus, fear of loss, wanting to look good, and greed. Sounds like the world of business to me. People need “advanced threat detection” much less than.....Read More
It’s well known that email is the most frequent form of attack, it’s well known that email is most easily compromised, and it’s well known that scammers rely on deception. Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable: being in a rush, being stressed out, losing focus, fear of loss, wanting to look good, and greed. Sounds like the world of business to me. People need “advanced threat detection” much less than they need counseling and training.  Read Less
Like(0)  (0)

Linkedin Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-analysis-of-fbi-crime-report

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Patrick Hamilton, Security Evangelist , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/security-experts-analysis-of-fbi-crime-report

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel