Attribution As A Weapon & Marketing Tool: Hubris In INFOSEC & NATSEC
Preamble: In talking to Steve Ragan over the time between the Sony initial hack and now he confided in me that he had some emails and data that may come to bear on the whole attribution drum that I...
View ArticleChongryon and Sony
#GOP Concerns Pastebin posted 12/31/14 #G…O……P……. express highest regard to the People of North Korea. It is the juche we strive to free the world. It is our stance that 공화국영웅 shall be given to the...
View ArticleI guess I am a “SONY Truther” are you?
Hoodie can be made on http://www.zazzle.com if so inclined. The Evidence is Where? Right, well James Comey (FBI) came out yesterday at a conference in NYC with what he might think is definitive proof...
View ArticleDDoS Will Not Stop Daesh or AQ or AQAP
Anonymous Hackers Target Jihadist Twitter Accounts And Websites: Nine Down Hackers ‘disable extremist website’ Charlie Hebdo: How ‘hacktivists’ and cyber-jihadis will wage a digital war I have another...
View ArticleThreat Intelligence Report – December/January 2014/2015
Threat Intelligence Report – December/January 2014/2015 Contents Contents 2 Executive Summary: 3 Global Threats: 3 The Sony Hack & New Norms in Intrusions 3 Assessment: 3 The Government Response...
View ArticleSisyphus and The Attribution Rock
In the wake of the release that Anthem has been hacked I have been taking stock of where we are today where information security is concerned. It seems that if you just look at the industry through...
View ArticleOpISIS and CharlieHebdo: Whack-A-Mole Without A Plan
Cyber WAR indeed… <Shakes head> Since the Charlie Hebdo attacks it seems that Anonymous has finally become self aware about the online jihad that has been going on for years now. While I can...
View ArticleCYB3RC: The Cyber Caliphate, Newsweek, and DCITA
The Cyber Caliphate Hacks Newsweek and DCITA: Since the hack on the Pentagon’s CENTCOM Twitter feed and the dropping of dox from someone’s email/phone/machine the so called “CyberCaliphate” had been...
View ArticleDaesh: Islamic Millenarians or Just Propaganda?
A Cosmic War A recent article in The Atlantic has staked the claim that daesh is a millenarian cult bent on bringing the apocalypse upon the world. The article uses recent materials from Dabiq (the...
View ArticleGlobal Threat Intelligence Report: FEBRUARY 2015
Global Threat Intelligence Report February 2015 Contents February 2015 1 Attackers have cloned malware-laden copies of the most popular apps your employees use 3 Discussion: 3 What is Freak and who is...
View ArticleOMG CYBER CSI!
So you all know me, I had to go and download CSI Cyber just to see. I mean, I couldn’t resist because I am a masochist and I knew that this would be a terrible show so I had to see it! Well I am happy...
View ArticleMuch Ado About Nothing: Team System DZ and Defacements
Recently there was a spate of defacements by Team System DZ that has been making the rounds in the mainstream media. These defacements by Poti-SaDZ or Poti Sad Darky and his derpy bandito boyz using...
View ArticleGlobal Threat Intelligence Report March 2015
GLOBAL Threat Intelligence Report – March 2015 Executive Summary In the month of March there were several high level vulnerabilities exposed ranging from programmatic issues to compromise of user...
View ArticleTHE SNOWMAN EFFECT: It’s all about the dick pics!
Watch video first.. Yes, watch it again if you haven’t already then read on…. Ok, so do you feel some horror and outrage even though you laughed your ass off? Yeah, me too. But after those feelings...
View ArticleAdvanced Persistent Failure: The Malaise of INFOSEC
An INFOSEC Maturity Differential Diagnosis: Advanced Persistent Failure (APF *tm*) is a term that I coined today in my Twitter feed that I have yet to trademark before Rob Graham (@erratarob) gets...
View ArticleGlobal Threat Intelligence Report April 2015
Executive Summary In the month of April the world saw much of the same tricks and hacks against companies, governments, and people carried out by the usual suspects. Needless to say, the fact of the...
View ArticleMay 2015 Global Threat Intelligence Report
GLOBAL Threat Intelligence Report – May 2015 Executive Summary In the month of May 2015 we saw the advent of “stunt hacking” with the claims of one researcher being able to hack a plane’s engines...
View ArticleTHE DEFENDER’S DILEMMA: CISO’s and Execs to the right of me… APT’s and...
The Defender’s Dilemma: This week I came across a tweet from @violetblue about an article she wrote for ZDnet on a RAND study that had recently been published. The report; “The Defenders Dilemma:...
View ArticleDarknet Jihad: These Aren’t The Sites You Are Looking For
OMG DARKNETS! I recently gave a presentation at Mass Hackers on “Online Jihad” which went very well. While I was covering the online jihad, the topic of Darknet Jihad came up as well, it usually does...
View Article