Panda Threat Group Mines for Monero With Updated Payload, Targets

Though harboring unsophisticated payloads, the Panda threat group has updated its tactics – from targets to infrastructure – and successfully mined hundreds of thousands of dollars using cryptomining malware. Continue reading Panda Threat Group Mines for Monero With Updated Payload, Targets

The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why

The dark web market is shifting from commodities to cybercrime services such as infrastructure-as-a-service (IaaS) and malware-as-a-service (MaaS), creating benefits and challenges for security teams.

The post The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why appeared first on Security Intelligence.

Continue reading The Dark Web Market Is Moving Toward IaaS and MaaS — Here’s Why

Drone flametherower spits out a 25-foot-long, targeted stream of fire

Tempted as you might be to grab one of these for the impending zombie-apocalypse, the TF-19 Wasp from Ohio-based Throwflame is a serious piece of kit with potentially life-saving applications. From clearing critical infrastructure to pest man… Continue reading Drone flametherower spits out a 25-foot-long, targeted stream of fire

Maciej Cegłowski on Privacy in the Information Age

Maciej Cegłowski has a really good essay explaining how to think about privacy today: For the purposes of this essay, I’ll call it "ambient privacy" — the understanding that there is value in having our everyday interactions with one another r… Continue reading Maciej Cegłowski on Privacy in the Information Age

Maciej Cegłowski on Privacy in the Information Age

Maciej Cegłowski has a really good essay explaining how to think about privacy today: For the purposes of this essay, I’ll call it "ambient privacy" — the understanding that there is value in having our everyday interactions with one another remain outside the reach of monitoring, and that the small details of our daily lives should pass by unremembered. What… Continue reading Maciej Cegłowski on Privacy in the Information Age

A Field Guide to Transmission Lines

The power grid is a complicated beast, regardless of where you live. Power plants have to send energy to all of their clients at a constant frequency and voltage (regardless of the demand at any one time), and to do that they need a wide array of equipment. From transformers …read more

Continue reading A Field Guide to Transmission Lines

The Human Cost of Cyberattacks

The International Committee of the Red Cross has just published a report: "The Potential Human Cost of Cyber-Operations." It’s the result of an "ICRC Expert Meeting" from last year, but was published this week. Here’s a shorter blog post if you don’t want to read the whole thing. And commentary by one of the authors…. Continue reading The Human Cost of Cyberattacks

Taming the Jungle: Hardening your AWS infrastructure

After nine tutorials, sixteen posts on stack overflow, and several hours or workweeks of effort you’ve finally done it. You’ve finally got something in Amazon Web Services (AWS) to work as expected. It could have been something as simple as… Continue reading Taming the Jungle: Hardening your AWS infrastructure