Wiper Malware Mitigation Strategies

Wiper Malware Mitigation Strategies

Wiper malware threats have become a concern as geopolitical tensions rise. Security researchers have identified new strain of malware targeting Ukraine, dubbed HermeticWiper. Wiper malware is designed to render systems inoperable and irrecoverable without solid backups. Currently the wiper malware is targeting Ukraine and some surrounding countries including Latvia and Lithuania. But this attack could easily turn toward the US …

Rise in Ransomware for Critical Infrastructure

Rise in Ransomware for Critical Infrastructure

CISA, the FBI, NSA, the Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre released a CISA Joint Cybersecurity Advisory highlighting a rise in ransomware incidents against critical infrastructure organizations in 2021. These ransomware incidents are sophisticated and high-impact. The advisory lists 18 mitigation steps 😬 (included below for reference). I can think of additional items …

Thunderspy and Your Cybersecurity Program with a picture of a lightning strike

Thunderspy And Your Cybersecurity Program

A newly released set of vulnerabilities termed “Thunderspy” allow an attacker with physical access to your encrypted computer in sleep mode (not powered off and not hibernated) to take full control of your system utilizing a Thunderbolt port. In this compelling video, Thunderspy’s author, Björn Ruytenberg, demonstrates bypassing the Windows lock screen in under five minutes using a set of …

Social Media Security & Hacking Password Reset Functions

NFL Twitter Hack and Password Reset Functions

Discussing the recent Twitter account breaches of 15 NFL teams and Facebook resulting from a password reset flaw in a third party-developed application, Khoros. Learn how hackers use password reset flaws to bypass authentication and what we can all do to improve social media account security and make sure these flaws don’t bite us! It is time we start treating …

Video frame of Geoff holding the 2020 Healthcare Data Breach Intelligence Report

How To Approach Vendor Risk Management

In my latest video below I discuss the largest healthcare data breach of 2019 and how organizations should approach vendor risk management to manage the risk that your vendors present to you. 63% of all healthcare data breached in 2019 was due to the breach of one third-party collection agency, American Medical Collection Agency (ACMA). This breach affected Quest Diagnostics, …

When Strict Password Policies Backfire

Passwords that are changed more frequently are more secure, right? Not necessarily. I was working with an organization that takes security seriously. Defense in depth and least privilege permeate their environment. Users do not have administrator privileges and are not allowed to remotely login to systems. Network segmentation keeps a compromised workstation from reaching the administrator interfaces on servers. Only …

Apply the BlueKeep Patch Now

I’m writing to let you know about a critical Windows security patch that should be deployed to affected systems ASAP. The BlueKeep vulnerability (CVE-2019-0708) is a remotely exploitable flaw in the Remote Desktop Protocol (RDP) Services on older versions of Windows including: Windows Server 2008 R2 Windows 7 Windows Server 2008 Windows Vista Windows Server 2003 Windows XP Both Microsoft …

Game of Thrones’​ Great War and Cybersecurity

Did you catch the epic Game of Thrones episode “The Long Night” last night? If not, be warned…SPOILERS AHEAD I couldn’t help watching this episode and thinking how it is an analogy for protecting one’s most critical assets in the digital age. These are the cybersecurity concepts came to mind as I was watching the episode. Defense in Depth Armies …