December 21, 2022
Asymmetric Cyber Vulnerability
A unique property of cyber power is that it is available without significant upfront capital expenditure. Here is an interesting case study of poor rural people executing cyber enabled extortion against much more affluent victims. Cyber provides a vast array of mechanisms to exercise power.
Here we have cyber creating the ability for subsistence farmers with internet access on cheap smartphones to attack people with far more resources. The lesson of asymmetric cyber vulnerability is clearly demonstrated by this case.
The sextortion scammers of rural India - Rest of World
Authorities say scammers use burner phones and fake profiles to blackmail victims across the country.
-
-
-
Numbers Stations and Enigma Stations
Signals Identification wiki
https://www.sigidwiki.com/wiki/Category:Numbers_Stations-
-
My mom, falsely suspecting I am a serious cybersecurity professional
Mike Sexton: "My mom, falsely suspecting I am a serious cyberse…" - Infosec Exchange
Attached: 1 image My mom, falsely suspecting I am a serious cybersecurity professional
-
So I gave a talk last week at SecTalks on predicting Pump & Dump #scams in #Crypto (you know, other than simply saying "they all are" which would be pretty damn accurate). You know, the ones that run on Telegram groups, where the other group members are the actual suckers.
Process is simple. I took a real world example and analysed the history. Then built an API reading script to crawl for the same signs, across all 2200 tokens in Binance. Basically, you just look for a gradual increase in buy pressure that is close - but not close enough - to baseline. We're not looking for spikes or major changes. We want to see people trying to be subtle.
We do this by comparing the month ave to the day ave and watching for those with a ratio near to 1 but not too near.
Then we look at the purchases when this happens and measure the randomness of them - and look for non-random purchasing. You can see in the Excel based graph the data all has a clear upper and lower bound, this buying was anything but random and was clearly done by a bot.
Then the purchasing tails off and goes quiet.
And that's how we know there's a pump about to happen.
Chloe Fletcher: "So I gave a talk last week at SecTalks on predict…" - Infosec Exchange
Attached: 4 images So I gave a talk last week at SecTalks on predicting Pump & Dump #scams in #Crypto (you know, other than simply saying "they all are" which would be pretty damn accurate). You know, the ones that run on Telegram groups, where the other group members are the actual suckers. Process is simple. I took a real world example and analysed the history. Then built an API reading script to crawl for the same signs, across all 2200 tokens in Binance. Basically, you just look for a gradual increase in buy pressure that is close - but not close enough - to baseline. We're not looking for spikes or major changes. We want to see people trying to be subtle. We do this by comparing the month ave to the day ave and watching for those with a ratio near to 1 but not too near. Then we look at the purchases when this happens and measure the randomness of them - and look for non-random purchasing. You can see in the Excel based graph the data all has a clear upper and lower bound, this buying was anything but random and was clearly done by a bot. Then the purchasing tails off and goes quiet. And that's how we know there's a pump about to happen.
-
-
-
-
🔖 Introducing PEACH, a tenant isolation framework for cloud applications
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface. From @wiz_io@twitter.com
Introducing PEACH, a tenant isolation framework for cloud applications | Wiz Blog
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface
Marco Lancini: "🔖 Introducing PEACH, a tenant isolation framework…" - Infosec Exchange
🔖 Introducing PEACH, a tenant isolation framework for cloud applications A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation by reducing your cloud applications’ attack surface. From @wiz_io@twitter.com https://www.wiz.io/blog/introducing-peach-a-tenant-isolation-framework-for-cloud-applications
-