DevSecOps · Security

Why SQL Injection is Inexcusable

I found this awesome infographic from Akamai and I wanted to talk about it a bit because while the infographic itself is awesome, what is represents is the terrible truth behind the point I keep making about DevSecOps. More than 148 million SQL injection attacks… Why? Well, in short, because they work but they only… Continue reading Why SQL Injection is Inexcusable

Fake News · Security · Social Media Engineering

What do Bears, Cranes, and Kittens Have in Common?

Russia, Iran, and China are all attempting to interfere in the November election using some very sophisticated techniques. Without very sophisticated data analysis, its virtually impossible to spot the fakes. The Russian misinformation campaign is back up and running again. This time its using AI to generate fake photos, fake LinkedIn profiles, fake Twitter Accounts,… Continue reading What do Bears, Cranes, and Kittens Have in Common?

IoT · Security

High Wattage IoT Devices Used to Manipulate Energy Market

Enron started it but the other power companies have all picked up the practice of playing the spot market for energy production and consumption. This works a lot like the Wall Street Futures Market where there is certain amount of financial speculation that goes on around both the supply and demand. If demand is high,… Continue reading High Wattage IoT Devices Used to Manipulate Energy Market

Fake News · Security

Fake News from Actual News Outlets

In a recent release FireEye identified a misinformation campaign but this time it wasn’t coming from Facebook, Twitter or any other social media. The news agencies had their content management systems hacked and the hackers were publishing fake news in psy-ops bid to sway public opinion against NATO. The attack appears to have been running… Continue reading Fake News from Actual News Outlets

Security

Spear Phishing and Cryptocurrency Hacking

Apparently CryptoCore has raked in about $200 million USD from practicing low tech techniques like Spear Phishing and Whaling. The executives running the cryptocurrency exchanges were targeted in order to steal the wallet credentials. Worse yet, is that they have been very effective in covering their trail. Its likely to be based in eastern Europe,… Continue reading Spear Phishing and Cryptocurrency Hacking