Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Browser and App Pivots are part of the Problem, Seraphic looks to Address this with one Agent to Rule them All

If you look at common attack vectors and especially Initial Access Broker attacks, there are a few parts of the attack chain which stand out. These are the pivot through some form of communication/collaboration app to the phishing landing page. These apps are also often part of insider threats where someone might use their own personal email, OneDrive, or other web/app-based app to exfiltrate information they want outside of an organization. Many companies are very exposed to this either through a lack of tools, skilled staff or being oblivious to the exposure.

Details
By Sean Kalinich
Sean Kalinich
Jul 31
Hits: 1305
  • Hacking
  • Cybersecurity
  • Phishing
  • seraphic secutity
  • hidden browsers
  • browser virtualization

Read more: Browser and App Pivots are part of the Problem,...

No comments on “Browser and App Pivots are part of the Problem, Seraphic looks to Address this with one Agent to Rule them All”
Security Talk

Cybersecurity needs to Stop Fighting the “Last War” as Attackers Pivot easily Between Vectors

When I was in the military, one of the things that I noticed was a massive reluctance to create new and unusual scenarios for war games. Instead, we always seemed to train for the last major combat theater. When going to the National Training Center the OpFor (opposing force) team would just run circles around the visiting units. This is because they were always looking at new strategies, tactics, and logistical methods to support them. The visitors would come in with ideas that things would be the same as last time and just get their asses handed to them. There were rare occasions when the visiting units won, but they were the exception and not the rule.

Details
By Sean Kalinich
Sean Kalinich
Jul 20
Hits: 952
  • Cybersecurity
  • BMC
  • Attack Vectors
  • Vulnerability Management
  • eclypsium
  • attack surface

Read more: Cybersecurity needs to Stop Fighting the “Last...

No comments on “Cybersecurity needs to Stop Fighting the “Last War” as Attackers Pivot easily Between Vectors”
Security Talk

How to Start Building or Improving Your Cybersecurity Program

One of the most commonly asked questions in cybersecurity is “where do I start?” This common question shows just how overwhelmed many organizations are when faced with the reality of the threats that are out there. From ransomware to business email compromise, the threat actors certainly seem to be ahead of the implementations when it comes to securing the data that organizations are responsible for. So where should an organization start when it comes to building or optimizing their cybersecurity program?

Details
By Sean Kalinich
Sean Kalinich
Jul 18
Hits: 962
  • Cybersecurity
  • Patching
  • Vulnerability Management
  • Security Tools
  • xdr
  • mdr
  • edr

Read more: How to Start Building or Improving Your...

No comments on “How to Start Building or Improving Your Cybersecurity Program”
Security Talk

Crypto Mining Malware Targeting Linux and Linux Based IoT Devices Show How Little we have Progressed in IoT Security

IoT (Internet of Things) devices have long been a source of security concerns. Back in 2012-2014 we wrote a series of articles following the comedy of errors that is the IoT market. At the time I dubbed it the Internet of Fails simply because the companies making these internet connected devices were leaving them so open to compromise. Everything from a lack of encrypted communication with cloud services, to no passwords on administrative functions, to using images that had open files and folders in the firmware were found in popular connected products that were shipped to customers. Supply chain compromises were also found in generous quantities, making the mad rush to connect everything a serious concern.

Details
By Sean Kalinich
Sean Kalinich
Jun 23
Hits: 1654
  • Security
  • Malware
  • Botnet
  • IoT
  • crypto mining
  • sbom
  • netrise

Read more: Crypto Mining Malware Targeting Linux and Linux...

No comments on “Crypto Mining Malware Targeting Linux and Linux Based IoT Devices Show How Little we have Progressed in IoT Security”
Security Talk

Why SBOM is in the News and Why it is Important

Since Executive Order 14028 came out on May 12th from the Biden Administration there has been a lot of talk about what it means and what are the legal and regulatory ramifications of this order. While the larger conversation is one for a later (and much longer) article the overall tone of the EO is one that highlights a desire to centralize control over cybersecurity at the federal level, but not a lot of direct regulatory changes. Everything is recommendations, or guidelines. There is nothing in EO14038 that makes any real changes. Now that is both a good thing and a bad thing. On the one hand it means that organizations have time to adapt to the tone and general message of the EO and new cybersecurity requirements, and on the other hand, as we are already in an election cycle, many companies are likely to adopt a wait and see attitude towards any changes. One area is around SBOM, or Software Build of Materials.

Details
By Sean Kalinich
Sean Kalinich
Jun 06
Hits: 788
  • Hacking
  • Security
  • Cybersecurity
  • sbom
  • software build of materials
  • bom
  • controlled bom

Read more: Why SBOM is in the News and Why it is Important

No comments on “Why SBOM is in the News and Why it is Important”

More Articles …

  1. Attackers are Actively Exploiting Recent Vulnerabilities Found in F5 BIG-IP
  2. New Advanced Fileless Malware Found Using Windows Event Logs
  3. Ukrainian Hacktivists Hit Russia Where It Hurts, Alcohol.
  4. Another Bug Found in Android, This One Actively Exploited
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12

Page 8 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech