On September 19, 2022, an 18-year-old cyberattacker known as “teapotuberhacker” (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos…
Browsing CategoryThreat Intelligence
Self-Checkout This Discord C2
This post was made possible through the contributions of James Kainth, Joseph Lozowski, and Philip Pedersen. In November 2022, during an incident investigation involving a self-checkout point-of-sale (POS) system in…
3 Reasons to Make EDR Part of Your Incident Response Plan
As threat actors grow in number, the frequency of attacks witnessed globally will continue to rise exponentially. The numerous cases headlining the news today demonstrate that no organization is immune…
Overcoming Distrust in Information Sharing: What More is There to Do?
As cyber threats increase in frequency and intensity worldwide, it has never been more crucial for governments and private organizations to work together to identify, analyze and combat attacks. Yet…
Charles Henderson’s Cybersecurity Awareness Month Content Roundup
In some parts of the world during October, we have Halloween, which conjures the specter of imagined monsters lurking in the dark. Simultaneously, October is Cybersecurity Awareness Month, which evokes…
What You Should Know About the Honda Key Fob Vulnerability
As a cybersecurity writer, I’m more aware than the average person of the security risks with any connected device. So when I sat in my new car for the first…
Why Do Ransomware Gangs Keep Coming Back From the Dead?
Ransomware gangs are major players in the cybersecurity space, especially in recent years. ZDNet reported that ransomware gangs increased their payments by over 311% from 2019 to 2020, with totals…
How IBM Secured the 2022 US Open
Throughout the US Open Tennis Championship, the infrastructure for USOpen.org and the mobile apps can see upwards of 3 million security events. While the vast majority of events are not…
A Response Guide for New NSA and CISA Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) recently published a report highlighting a range of critical security vulnerabilities requiring attention from organizations of all types. The report was published with…
Old Habits Die Hard: New Report Finds Businesses Still Introducing Security Risk into Cloud Environments
While cloud computing and its many forms (private, public, hybrid cloud or multi-cloud environments) have become ubiquitous with innovation and growth over the past decade, cybercriminals have closely watched the…