opsec

JFK and the Houthis: Haste Makes Waste of Security
Rather than simply exposing buried truths of the assassination, the final tranche of JFK files also exposed the personal information, including social security numbers, of a parade of people associated with the ...
Security Boulevard

Don’t Touch That Object! Finding SACL Tripwires During Red Team Ops
During red team operations, stealth is a critical component. We spend a great deal of time ensuring our payloads will evade any endpoint detection and response (EDR) solution, our traffic is obfuscated ...

South Korean iPhone Ban: MDM DMZ PDQ
Richi Jennings | | android, Apple, Apple iOS, Apple iPhone, bring your own device, byod, byod challenges, BYOD policy, BYOD Security, clandestine iPhone tracking, iPhone, iPhone and iPad, iphone security, Korea, Korean military, MDM, military, military grade security, Military Security, Mobile Device Management (MDM), North Korea, northkorea, Noth Korea, Operational military strategy, opsec, Samsung, Samsung Galaxy, SB Blogwatch, South Korea, southkorea
MDM Hindered: Android phones are still OK; this is Samsung’s home, after all ...
Security Boulevard

Cyber Lingo: OpSec meaning & uses
Ryan H. | | CISO Suite, Cyber Lingo, Home, operational security, operations, Operations Security, opsec, Seed n soil posts
The post Cyber Lingo: OpSec meaning & uses appeared first on Click Armor ...

Cyber Lingo: OpSec meaning & uses
Ryan H. | | CISO Suite, Cyber Lingo, Home, operational security, operations, Operations Security, opsec, Seed n soil posts
The post Cyber Lingo: OpSec meaning & uses appeared first on Click Armor ...
Everyman’s Cyber Defence
The following is my translation of “Jokamiehen kyberpuolustus”, Everyman’s Cyber Defence, a short snippet from publicly available document #kyberpuolustus : kyberkäsikirja Puolustusvoimien henkilöstölle (2019) by Laari, Flyktman, Härmä, Timonen and Tuovinen. Source ...

US Helped Ukraine With Infosec—Story is ‘Dangerous Arrogance’
Richi Jennings | | Anonymous, It's more than unhelpful—it's dangerous myopic arrogance, opsec, Russia, SB Blogwatch, Ukraine, wiper malware
Mainstream media has been full of stories about how the U.S. cleverly anticipated the Russian invasion of Ukraine and skilfully helped the country shore up its defences against Russian hacking. But scratch ...
Security Boulevard
Practice Safe SECs: Cyber intelligence experts on building safe operational security and information security practices
Two cybersecurity veterans from Authentic8 and Forrester share real-life stories from their tenures in public and private sector organizations ...

Be On Alert During Election Season
From disruptive DDoS attacks to influential campaigns, several countries have already experienced election interfering cyberattacks this year. The post Be On Alert During Election Season appeared first on Radware Blog ...
The OPSEC of Protesting
Ochaun Marshall | | attending a protest, cybersecurity protest, cybersecurity risks protesting, opsec, OPSEC security, Privacy, Privacy & Personal Security, protest Hong Kong, protest privacy, Protesting, security hygiene
For the past three months thousands of people have been protesting in the United States due to the deaths of George Floyd, Breonna Taylor, Tony McDade, and others. Many of the protesters ...