As FireEye grapples with breach investigation, questions remain

FireEye’s announcement this week that hackers breached its systems has sent shockwaves through the cybersecurity community, raising new questions about how one of the most influential security firms in the U.S. grappled with an apparently state-sponsored attack. It also has triggered policy discussions about whether the U.S. government should do more to protect cyber industry titans like FireEye, one of the top cybersecurity firms in the world with customers that counts Fortune 500 companies among its clients. The hack adds FireEye to the list of cybersecurity companies that have experienced their own breaches, a roster stretching back to at least the beginning of the last decade. “This news has rocked the cybersecurity industry to our core, unlike anything since the RSA hack” from 2011, said Tom Bossert, president of Trinity Cyber and the former homeland security adviser to President Donald Trump. “It’s a pretty big deal.” FireEye revealed on Tuesday […]

The post As FireEye grapples with breach investigation, questions remain appeared first on CyberScoop.

Continue reading As FireEye grapples with breach investigation, questions remain

Exploring Animal Intelligence Hack Chat

Join us on Wednesday, October 21st at noon Pacific for the Exploring Animal Intelligence Hack Chat with Hans Forsberg!

From our lofty perch atop the food chain it’s easy to make the assumption that we humans are the last word in intelligence. A quick glance at social media or a …read more

Continue reading Exploring Animal Intelligence Hack Chat

Phish Fryday – Phishing Threats with Palo Alto Unit 42

Phishing threats take many forms and are used to deliver malware, steal credentials, and entice recipients into taking actions they will later regret. Despite advances in technology, these threats continue to reach inboxes and continue to succeed. In t… Continue reading Phish Fryday – Phishing Threats with Palo Alto Unit 42

Phish Fryday – Phishing Threats with Palo Alto Unit 42

Phishing threats take many forms and are used to deliver malware, steal credentials, and entice recipients into taking actions they will later regret. Despite advances in technology, these threats continue to reach inboxes and continue to succeed. In t… Continue reading Phish Fryday – Phishing Threats with Palo Alto Unit 42

The Mozart Effect: Study affirms classical music reduces epileptic seizures

A new systemic review has examined a dozen studies into the effect of Mozart’s music on epilepsy, finding the classical piano music may reduce the frequency of seizures. The review rekindles an idea that has circulated since the early 1990s, labelled t… Continue reading The Mozart Effect: Study affirms classical music reduces epileptic seizures

Announcing Law Enforcement and OSINT Intelligence Operation “Uncle George” – Join Me Today! – Part Three

Dear blog readers,I’ve decided to issue the following update in terms of my currently ongoing OSINT and Law Enforcement Operation called “Uncle George” which basically consists of all the publicly accessible IPs for all the currently active and publicl… Continue reading Announcing Law Enforcement and OSINT Intelligence Operation “Uncle George” – Join Me Today! – Part Three

Why the FBI’s cyber attachés are so valuable

On an average day, cybercriminals visiting the Darkode darkweb forum would expect to enter an underground, invitation-only digital marketplace to buy, sell, and trade malware, access to botnets, and stolen personal information. However, in July 2015, users were instead confronted with the emblems of the U.S. Federal Bureau of Investigation (FBI), the U.S. Department of Justice (DOJ), and EUROPOL’s European Cyber Crime Center (EC3) instead of the Darkode homepage. A large, bold warning surrounded by the official seals of 17 additional international police departments prominently proclaimed, “This domain and website have been seized.” This was the culmination of a multi-year joint undercover operation by U.S. and international law enforcement from 20 countries who searched, charged, or arrested 70 of the forum’s members worldwide and indicted 12 individuals with computer fraud conspiracy. This joint effort, known as Operation Shrouded Horizon, exemplifies the collaboration needed to counter the increasingly complex and diffuse […]

The post Why the FBI’s cyber attachés are so valuable appeared first on CyberScoop.

Continue reading Why the FBI’s cyber attachés are so valuable

Theft of CIA’s ‘Vault 7’ Secrets Tied to ‘Woefully Lax” Security

An internal investigation into the 2016 CIA breach condemned the agency’s security measures, saying it “focused more on building up cyber tools than keeping them secure.” Continue reading Theft of CIA’s ‘Vault 7’ Secrets Tied to ‘Woefully Lax” Security

Congress wants to know who is using spyware against the US

A 2021 intelligence funding draft bill mandates a report on surveillance vendors and which countries or other actors are using spyware. Continue reading Congress wants to know who is using spyware against the US