During War are we getting Attacked More?
I am talking about the Russian war against Ukraine which started on Feb 2022. Do you have 80 computes, more than a dozen? Then it should be obvious that they…
Hacked? Got insurance? No Payout!!
SCMagazine story on January 3rd. makes you think about the efficacy of cyber insurance. The problem is the government fines and some of the details in the contract language: “The…
2022 What Did we Learn in Cybersecurity?
49 posts on this blogsite oversitesentry in 2022 There were many different posts I chose 4 to highlight in early ’22: What does Segmentation DonaldTrump Malware post Jan 25,22 Hackers…
Password Managers Hacked: Passwordstate and Lastpass
Passwordstate security failure was worse than Lastpass – but any entity can be hacked or have a cybersecurity failure. Looking into the specifics Passwordstate issue is discussed in portswigger website.…
How Can a Small Business Prepare for Cyber Disaster?
Let’s discuss what a cyber disaster is… a disaster in the cyber world would be losing the ability to run the apps and information that you want to run on…
Less Than 100 Employees: 3x More Likely Target
At Technewsworld the following quote is interesting: “Attackers do not just target large enterprises. Recent reporting shows companies with less than 100 employees are three times more likely to be…
Every month New Vulnerabilities and Patches/Fixes
A new Vulnerability which was a “Zero Day” vulnerability in a Windows Tool called MSDT (Microsoft Support Diagnostic Tool) according to Technewsworld.com story You can see the tool here in…
Twitter Site Claims to Know Ransomware Targets
Someone set up a twitter bot that knows which companies get ransomware(it claims): For example I picked out Wyckoff Heating and Cooling(2023 – 3-11), Maximum Industries Inc(2023 – 3-13),…
Will Attackers Use AI to Attack Us?
Short answer to this question is Yes! Bruce Schneier(a fellow at the Berkman center for Internet and Society at Harvard University) said this in his paper of April 2021: The…
AI Used in Phishing attacks: BEC Business Email Compromise
What do you read when you read the following: “BEC groups launch executive impersonation attacks in at least 13 languages” Specifically this is interesting: “These attacks demonstrate that BEC is…
Another Problem In Cybersecurity: Too much work–> Burnout
Why is burnout important? If we are dependent on IT personnel to perform actions on a timely basis even when off-hours work must be done. And then expect them to…