08 Jan 2019

The United States and China – A Different Kind of Cyberwar

China is waging a long-term cyberwar against the U.S. and other western countries that is very different in nature than the type of conflict Western powers generally conceive of as “war”. The Chinese cyberwarfare efforts are an extension of the country’s economic policy that has been described by John Demers

Read More
08 Jan 2019

GandCrab Operators Use Vidar Infostealer as a Forerunner

In a disturbing two-stage malvertising attack campaign that highlights the increasingly complex nature of cyber attacks, the threat actors behind the infamous GandCrab ransomware have added Vidar, an information-stealing Trojan to their arsenal. In the first stage of the attack, the Fallout Exploit Kit is used to distribute Vidar. After

Read More
08 Jan 2019

New hardware-agnostic side-channel attack works against Windows and Linux

Researchers have discovered a new type of side-channel attack that targets the operating system rather than design flaws in CPUs or other hardware components, as was the case with previous attacks of this type. The attack is therefore consider “hardware-agnostic”. So far it has been found to be effective against

Read More
08 Jan 2019

Coinbase suspends Ethereum Classic (ETC) trading after double-spend attacks

Coinbase, a popular cryptocurrency trading platform, has suspended trading of the Ethereum Classic (ETC) currency after it discovered that criminals have been carrying out double-spend attacks on the ETC blockchain for the past few days, starting on January 5. Double-spend attacks require malicious actors to obtain at least 51% of the

Read More
08 Jan 2019

Ransomware Corrupts 24,000 Patient Records of California Specialist

Three recent notifications of major cyber incidents in the healthcare sector, highlight the massive cybersecurity issues affecting the industry: The Podiatric Offices of Bobby Yee experienced a ransomware attack in which the medical records of up to 24,000 patients were corrupted and perhaps altered as well. Bankers Life, an associate

Read More
14 Jun 2018

USB fans for journalists in Singapore: Cyber Security threat?

Journalists at the US-North Korea summit in Singapore were given USB-powered fans, an inclusion causing some alarm from those wary of malware that can be easily transmitted by USB-devices. While it looks like the fans did not include any storage or processing capabilities able to transmit malware, they present an

Read More
07 Dec 2016

Best Security, Business, and Technology Books of 2016

Dozens of times per year, I get asked to recommend my favorite books so I couldn’t say no when the OODA Loop team asked me to build on Mark Mateski’s popular Red Teaming book list by providing my top 10 books for 2016. I have very eclectic interests, so I’ve

Read More
19 Feb 2015

Every Cyber Attacker is an Insider

I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connection with no

Read More