Stopping Abuse in the Digital Age With The Anti-Human Trafficking Intelligence Initiative

Stopping Abuse in the Digital Age With The Anti-Human Trafficking Intelligence Initiative

At HYAS, we take pride in our effort to try to make a positive impact on the world whenever possible. Cybersecurity, of course, is a business, but stopping bad actors helps protect ...

More SolarWinds News

Microsoft analyzed details of the SolarWinds attack: Microsoft and FireEye only detected the Sunburst or Solorigate malware in December, but Crowdstrike reported this month that another related piece of malware, Sunspot, was ...
Postcards From The Rus

Postcards From The Rus

Reuters reporter Christopher Bing has reported a new 'probe' instantiated by the United States Federal Bureau of Investigation targeting a Rus-linked postcard (of-all-things) sent to FireEye, Inc. Chief Executive Officer Kevin Mandia ...
via     the respected information security capabilities of   Robert M. Lee     & the superlative illustration talents of   Jeff Haas   at   Little Bobby Comics  ! From the Little Bobby Archive’s and Originally Published March 12, 2017.

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – From The Archive – ‘WEEK 111’

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics! From the Little Bobby Archive’s and Originally Published March 12, ...
via    the respected information security capabilities of   Robert M. Lee     & the superlative illustration talents of   Jeff Haas   at   Little Bobby Comics  .

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 104’ (From The Archive)

via the respected information security capabilities of Robert M. Lee & the superlative illustration talents of Jeff Haas at Little Bobby Comics. Permalink ...

New Reductor Nation-State Malware Compromises TLS

Kaspersky has a detailed blog post about a new piece of sophisticated malware that it's calling Reductor. The malware is able to compromise TLS traffic by infecting the computer with hacked TLS ...

Cell Networks Hacked by (Probable) Nation-State Attackers

A sophisticated attacker has successfuly infiltrated cell providers to collect information on specific users: The hackers have systematically broken in to more than 10 cell networks around the world to date over ...
The Nonattribution Approximation

The Nonattribution Approximation

via Jordan Drysdale, writing at the Black Hills Infosec blog, regales us with a well attributed post, detailing a fucntional non-attribution hardware and software package... Today's Must Read. Permalink ...

Russians Hacked the Olympics

Two weeks ago, I blogged about the myriad of hacking threats against the Olympics. Last week, the Washington Post reported that Russia hacked the Olympics network and tried to cast the blame ...
Why (I believe) WADA was not hacked by the Russians

Why (I believe) WADA was not hacked by the Russians

| | attribution, Hack, Russia, WADA
Disclaimer: This is my personal opinion. I am not an expert in attribution. But as it turns out, not many people in the world are good at attribution. I know this post ...