AI Used in Phishing attacks: BEC Business Email Compromise
What do you read when you read the following: “BEC groups launch executive impersonation attacks in at least 13 languages” Specifically this is interesting: “These attacks demonstrate that BEC is…
Another Problem In Cybersecurity: Too much work–> Burnout
Why is burnout important? If we are dependent on IT personnel to perform actions on a timely basis even when off-hours work must be done. And then expect them to…
During War are we getting Attacked More?
I am talking about the Russian war against Ukraine which started on Feb 2022. Do you have 80 computes, more than a dozen? Then it should be obvious that they…
Hacked? Got insurance? No Payout!!
SCMagazine story on January 3rd. makes you think about the efficacy of cyber insurance. The problem is the government fines and some of the details in the contract language: “The…
2022 What Did we Learn in Cybersecurity?
49 posts on this blogsite oversitesentry in 2022 There were many different posts I chose 4 to highlight in early ’22: What does Segmentation DonaldTrump Malware post Jan 25,22 Hackers…
