Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
Expert Commentary On 30,000 Macs Infected With New...
Response Comment: Half Of Businesses Suffered A Cyber-Attack...
Expert Reaction On Google’s Password Checkup Feature Expanding...
Expert Comments On Secondary Extortion Attacks
Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing
Experts Reacted On Retail Giant Kroger Data Breach
Security A Glaring Issue For Chatroom App Clubhouse...
Parents Alerted To Nurserycam Security Breach – Experts...
How Can Consumers Better Protect Their Finances From...
Experts Insight On ‘Silent Stealing’ New Cyber Crime...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Tony Cole
CTO feature_status*/ ?>
Attivo Networks

Comments Dotted : 3
July 22, 2020

ISC Russia Report – CISO Comments On Cyber Attacks Facing Government

Calling out Russia publicly has had little effect on them outside of sanctions and even the latter doesn’t seem to curtail this activity.
It’s been clear for a number of years that the Russians have every intention to continue their efforts to undermine the fabric of Western society. They do this by focusing on a non-stop flow of disinformation campaigns in their targeted countries to sow disinformation to undermine free society foundations and especially hamper free and fair elections. Countries should have a structure in place to strike back in a fair and meaningful manner through offensive cyber actions. This structure.....Read More
It’s been clear for a number of years that the Russians have every intention to continue their efforts to undermine the fabric of Western society. They do this by focusing on a non-stop flow of disinformation campaigns in their targeted countries to sow disinformation to undermine free society foundations and especially hamper free and fair elections. Countries should have a structure in place to strike back in a fair and meaningful manner through offensive cyber actions. This structure should be focused inside government and not allow individual companies to retaliate when impacted by Russian campaigns (or any other country). Calling out Russia publicly has had little effect on them outside of sanctions and even the latter doesn’t seem to curtail this activity. Hitting them in cyberspace where it’s impactful to their society and could help counter Putin’s government is where attention is needed. Organizations attempting to thwart activity from Russia and other nation-states need to step up their game where they detect malicious activity inside their enterprises in quick fashion. Public Service Announcements across media and social media could also help educate the public and help counter disinformation campaigns from foreign sources. It is quite clear that significant action must be taken before foreign efforts to undermine western society have a long-term effect.  Read Less
Like(12)  (0)

Linkedin Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Calling out Russia publicly has had little effect on them outside of sanctions and even the latter doesn’t seem to curtail this activity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/isc-russia-report-ciso-comments-on-cyber-attacks-facinggovernment

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Calling out Russia publicly has had little effect on them outside of sanctions and even the latter doesn’t seem to curtail this activity...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/isc-russia-report-ciso-comments-on-cyber-attacks-facinggovernment

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
July 17, 2020

Experts Insight On Major US Twitter Accounts Hacked in Bitcoin Scam

it’s impossible to state specifically at this point in time how the systems were taken over since we don’t have the internal details from Twitter.
The Twitter attack is an interesting one and we were lucky the actors involved were interested in monetizing the compromise versus creating potential significant unrest through the high profile accounts that were impacted. On the technical side, it’s impossible to state specifically at this point in time how the systems were taken over since we don’t have the internal details from Twitter. However, due to the number of accounts compromised it’s quite possible that an internal.....Read More
The Twitter attack is an interesting one and we were lucky the actors involved were interested in monetizing the compromise versus creating potential significant unrest through the high profile accounts that were impacted. On the technical side, it’s impossible to state specifically at this point in time how the systems were taken over since we don’t have the internal details from Twitter. However, due to the number of accounts compromised it’s quite possible that an internal administrators’ account was compromised via some method of phishing which bypassed any controls the individual Twitter user(s) had in place allowing the attackers to tweet anything from accounts under the control of that administrative account. If accurate, that attack could have been countered by focusing on two different but important security efforts. One, user awareness training to counter phishing susceptibility, and two, instrumentation inside the perimeter and on endpoints to detect adversary lateral movement and credential use. Both of those could have stopped the attack independently if the suspected methods are correct.  Read Less
Like(0)  (0)

Linkedin Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"it’s impossible to state specifically at this point in time how the systems were taken over since we don’t have the internal details from Twitter...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"it’s impossible to state specifically at this point in time how the systems were taken over since we don’t have the internal details from Twitter...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-major-us-twitter-accounts-hacked-in-bitcoin-scam

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
June 04, 2020

Experts Insight On Hackers Steal Data From US Nuclear Missile Contractor

Practical measures include ensuring all data is backed up with copies kept offline.
This is yet another high-profile example of a contractor being inadvertently used by threat actors to carry out a ransomware attack. Ransomware attacks are particularly prevalent at this time because threat actors know organisations may have left themselves vulnerable in the rush to avoid business disruption during the pandemic. To deal effectively with ransomware organisations need to move from reactive, incident response to an anticipatory, threat preparedness mindset. Practical measures.....Read More
This is yet another high-profile example of a contractor being inadvertently used by threat actors to carry out a ransomware attack. Ransomware attacks are particularly prevalent at this time because threat actors know organisations may have left themselves vulnerable in the rush to avoid business disruption during the pandemic. To deal effectively with ransomware organisations need to move from reactive, incident response to an anticipatory, threat preparedness mindset. Practical measures include ensuring all data is backed up with copies kept offline. Other steps include maintaining a secure infrastructure in line with NIST, ISO, or NCSC standards. Additionally, put in place a mechanism to cover lateral movement and ransomware detection and mitigation. Create, exercise, and update your incident response place at least yearly. Keep your systems are updated and have the latest patches.  Read Less
Like(4)  (0)

Linkedin Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Practical measures include ensuring all data is backed up with copies kept offline...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-hackers-steal-data-from-us-nuclear-missile-contractor

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Tony Cole, CTO , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Practical measures include ensuring all data is backed up with copies kept offline...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-hackers-steal-data-from-us-nuclear-missile-contractor

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

David Kennefick, Solutions Architect, Edgescan

"Mac users are advised to update their operating systems and install an antivirus. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Lewis Jones, Threat Intelligence Analyst, Talion

"The Silver Sparrow malware comes with a mechanism to completely remove itself, which is usually utilised for high-stealth operations. "

Expert Commentary On 30,000 Macs Infected With New Silver Sparrow Malware

Amit Sharma, Security Engineer , Synopsys Software Integrity Group

"One of the most substantial security challenges organisations currently face is how to manage their legacy products. "

Experts Reacted On Retail Giant Kroger Data Breach

Chris Ross, SVP, Barracuda Networks

"Combatting the issue from a business perspective requires an overhaul of cybersecurity policy. "

Response Comment: Half Of Businesses Suffered A Cyber-Attack In Last 12 Months

Jake Moore, Cybersecurity Specialist, ESET

"Password checking tools are an essential part of account security. "

Expert Reaction On Google’s Password Checkup Feature Expanding For Android Users

Satnam Narang, Senior Research Engineer, Tenable

"Despite the exclusivity of Clubhouse being available on an invite-only basis and limited to iOS devices. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Simon Mullis, Director of Technical Account Management, Tanium

"Simple steps can be put in place by any company that experiences a data breach to ensure it doesn’t happen again. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Stephen Kapp, CTO and Founder, Cortex Insight

"Organisations would be well-advised to embrace secure-by-design practices to avoid similar incidents. "

Parents Alerted To Nurserycam Security Breach – Experts Comments

Jonathan Reiber, Senior Director of Cybersecurity Strategy and Policy, AttackIQ

"ATT&CK provides an inventory for adversary tactics, techniques, and procedures that any organization can adopt. "

Cybersecurity Expert Shares Top Takeaways Amid SolarWinds Hearing

Jake Moore, Cybersecurity Specialist, ESET

"Similar to when Zoom usage went through the roof, Clubhouse is experiencing a huge uptake and learning as it goes. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Nick Emanuel, Senior Director of Product , Webroot

"Clubhouse is currently riding a wave of popularity. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Greg Foss, Senior Cybersecurity Strategist, VMware Carbon Black

"For opportunistic cybercriminals, secondary extortion is the name of the game. "

Expert Comments On Secondary Extortion Attacks

David Stewart, CEO, CriticalBlue - Approov

"You can't keep scripts and bots out of your business. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Saryu Nayyar, CEO, Gurucul

"Unfortunately, cybersecurity is an afterthought for many developers. "

Security A Glaring Issue For Chatroom App Clubhouse After Conversations Were Breached

Martin Jartelius, CSO , Outpost24

"It’s been a month from becoming aware of the breach to this wider disclosure, but it seems it’s been hard to establish who has been affected at all. "

Experts Reacted On Retail Giant Kroger Data Breach

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel