SolarWinds Hack and CISA(Government Agency) Directive Common Theme

2 stories from the Hacker News: Solar Winds Hackers Targeting Government and Why everyone needs to take the latest CISA directive seriously   The Solarwinds hack from last year (the one I discussed in several stories including this one: SolarWinds hackers Hacked Multi-factor Authentication. It is sometimes instructive to review past hacks to see what … Read more

Another New Ransomware Attack – Delete Files and Hide Them

Yes now your files will be hidden (apparently they will be placed in a Winrar format – which is a kind of packed encrypted format). And then the original files are deleted. There are more details in the Sophos analysis a their blogpost. How about this attack?  KrebsonSecurity has an interesting story about a Nigerian … Read more

Are You On The Internet?

What does it mean – Am I on the Internet?  Why ask this question? I want you to think about what it actually means. So we have the Internet (Google or other search engines). Each device has an IP address. This means even your watch may have an IP address.  Your IoT devices have IP … Read more

Can Cloud Services be Abused? Does the Sun Come Up Every Day?

Yes cloud service can be abused – but let’s be specific: Dark reading article:   The attack chain begins with the threat actor sending potential victims an email—on a topic of likely interest or relevance to the victim—with a link to a document on Google Docs. Users who follow the link are directed to a … Read more