Why consumer drones represent a special cybersecurity risk

Cybersecurity staff at an East Coast financial services company last summer detected unusual activity on its internal Atlassian Confluence page originating inside the company’s network. The MAC address used locally belonged to an employee known to be currently using the same MAC address remotely, according to a security specialist named Greg Linares, who had secondhand […]

The post Why consumer drones represent a special cybersecurity risk appeared first on Security Intelligence.

Continue reading Why consumer drones represent a special cybersecurity risk

Call for Interest – Establishing the Foundations for a Part-Time Project-Based Cybercrime Project Task Force

Dear blog readers,

I wanted to let everyone know that I’m currently busy a temporary part-time project-based task force and I might need your input in terms of a possible Task Force participation in the following categories:

Social Network Analysis
T… Continue reading Call for Interest – Establishing the Foundations for a Part-Time Project-Based Cybercrime Project Task Force

Dancho Danchev’s Blog – Soliciting Contributing Writers and Guest Bloggers

Dear blog readers,

As many of you noticed I’ve recently expanded my blog to include and feature a diverse set of personal research portfolio including additional coverage in a variety of areas and I wanted to let everyone know that I’m currently busy … Continue reading Dancho Danchev’s Blog – Soliciting Contributing Writers and Guest Bloggers

Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

With a focus on complex electronic crimes, attacks, and intrusions at the national, state, and local levels, the Digital Forensics for National Security Symposium facilitates discussions among defense, intelligence, government, industry, nonprofit, and… Continue reading Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

Is there any type of cyber attack for which the geographical distance between the attacker and the target matters?

Context
I cannot remember the source, but it was most likely within the comments box for a clip about cyberattacks happening after the Russian invasion of Ukraine. It was something along the lines:

comment: party X moved its hackers close… Continue reading Is there any type of cyber attack for which the geographical distance between the attacker and the target matters?

Legal implications of using corporate infrastruture in cyber attacks against Russia [migrated]

Recently, our data centers have been migrated from Ukraine to central Europe. Instead of shutting down, we intend to dedicate the infrastructure to launching cyber attacks against Russian state services and state-related businesses. In par… Continue reading Legal implications of using corporate infrastruture in cyber attacks against Russia [migrated]

The Cyber War Between Russia and Ukraine – An OSINT Analysis

Dear blog readers,I’ve decided to take a deeper look inside the currently ongoing cyber war between Russia and Ukraine and I’ve decided to provide actionable intelligence on the online whereabouts and actual campaign infrastructure behind the currently… Continue reading The Cyber War Between Russia and Ukraine – An OSINT Analysis

[SANS ISC] Ukraine & Russia Situation From a Domain Names Perspective

I published the following diary on isc.sans.edu: “Ukraine & Russia Situation From a Domain Names Perspective“: For a few days, the eyes of the world are on the situation between Russia and Ukraine. Today, operations are also organized in the “cyber” dimension (besides the classic ones – land, air, sea,

The post [SANS ISC] Ukraine & Russia Situation From a Domain Names Perspective appeared first on /dev/random.

Continue reading [SANS ISC] Ukraine & Russia Situation From a Domain Names Perspective