What are the security risks of storing sensitive documents on your android devices’s external storage?

Documents such as driving license, financial statements etc. with a lot of PII, how big is the risk of storing such type of documents on the shared external storage on android?
Assumptions:

Android device is encrypted but the individual f… Continue reading What are the security risks of storing sensitive documents on your android devices’s external storage?

Cyberwar Lessons from the War in Ukraine

The Aspen Institute has published a good analysis of the successes, failures, and absences of cyberattacks as part of the current war in Ukraine: “The Cyber Defense Assistance Imperative ­ Lessons from Ukraine.”

Its conclusion:

Cyber defense assistance in Ukraine is working. The Ukrainian government and Ukrainian critical infrastructure organizations have better defended themselves and achieved higher levels of resiliency due to the efforts of CDAC and many others. But this is not the end of the road—the ability to provide cyber defense assistance will be important in the future. As a result, it is timely to assess how to provide organized, effective cyber defense assistance to safeguard the post-war order from potential aggressors…

Continue reading Cyberwar Lessons from the War in Ukraine

Is it still recommended to block Living Off The Land Binaries (LOLBins) in Firewall?

https://lolbas-project.github.io/
Realistically, do we still need to block cmd.exe or certutil.exe in Windows firewall, on latest version of Windows? Lolbins are for Linux too but my question is only for Windows.
There are Attack Surface R… Continue reading Is it still recommended to block Living Off The Land Binaries (LOLBins) in Firewall?

Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

With a focus on complex electronic crimes, attacks, and intrusions at the national, state, and local levels, the Digital Forensics for National Security Symposium facilitates discussions among defense, intelligence, government, industry, nonprofit, and… Continue reading Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

Normative reference for a web application disclosing existing values of integration secrets to users

In a web-based SaaS product, one of the configuration pages allows users to set credentials for system-wide integrations with other products. These include usernames, passwords, and API secrets.
The sensitive fields are set as type="p… Continue reading Normative reference for a web application disclosing existing values of integration secrets to users