
Patrick Hamilton
Security Evangelist /*=$expert->feature_status*/ ?>
Lucy Security
Comments Dotted :
7
July 29, 2020
Networks never assume trust but humans do.
Ransomware attacks are rarely predicated upon a vulnerability within a network. Nine times out of 10 these attacks are predicated upon the vulnerability of humans. Networks never assume trust but humans do. Humans trust names that they’ve seen before, shared vendors, common connections, and on and on. Humans are the real endpoints, access points, and lowered defenses. Train humans, reduce risk.

July 08, 2020
Train your staff now to avoid falling prey to these cybercriminals in the near future.
The good news— less than 300 companies remain on the Fortune 500 for Cosmic Lynx to attack. The bad news—they're all behind the game because they think it won’t happen to them. No one is immune to BEC attacks, but anyone can be prepared. Train your staff now to avoid falling prey to these cybercriminals in the near future. Training is proven to decimate the risk. Let’s play a game of "would you rather." Would you rather: a) Spend a little now to dramatically reduce your risk of being.....Read More

June 10, 2020
The ransom note is written in nearly perfect English, rare form for threat actors.
Japanese companies are renowned for tight control and shipshape order. Creators of the new Snake ransomware may have one-upped Honda. The ransom note is written in nearly perfect English, rare form for threat actors. The threat uses sophisticated marketing psychology—almost like reading a friendly message from Amazon. How did venomous malware infiltrate such a tightly controlled organization? Probably email—the path of least resistance anywhere. It seems like a stroll through the park and.....Read More

April 03, 2020
Security Expert Re: Key Ring Exposes 44 M Digital Wallet Items Due To AWS S3 Bucket Misconfiguration
Developers can take "minimum viable product" to mean "does this work".
Developers can take "minimum viable product" to mean "does this work" -- they often forget to add security into their viability equation. For Key Ring, it seems overly simple to say basic security hygiene means following the instructions that came with your S3 bucket.
As for Key Ring users, there's a minimum cost of convenience: they will now have to be hyper vigilant with every email they receive. Phishing attacks with this level of information will easily get past firewalls.

March 30, 2020
Cybercriminals don’t care whether you survive COVID-19 or not.
Cybercriminals don’t care whether you survive COVID-19 or not. They care about one thing: gaining from your exposure. We know how stop these guys because we know lack of awareness is the greatest vulnerability.

February 19, 2020
The people that think they are safe are the most vulnerable.
It would be so easy to get wrapped in security blankets like zero-trust environments, but beware of being lulled into a sense of security. The people that think they are safe are the most vulnerable. You can trust the World Health Organization (WHO), can’t you? Not if they are the bad guy masquerading as the WHO. Don’t rely on a machine to tell you who to trust.

February 13, 2020
Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable.
It’s well known that email is the most frequent form of attack, it’s well known that email is most easily compromised, and it’s well known that scammers rely on deception. Email is a perfect storm—not because of sophisticated attacks—but because of the things that make users vulnerable: being in a rush, being stressed out, losing focus, fear of loss, wanting to look good, and greed. Sounds like the world of business to me. People need “advanced threat detection” much less than.....Read More
