July 17, 2022
Good analysis on problems with the phrase “zero trust.” It’s not the best for getting buy in from end users, and why that matters.
'Zero Trust' security is a poor choice of words
Consider the user's perspective when naming a security initiative
-
“I’ve read the title”
“Good enough”
-
Collections: Logistics, How Did They Do It, Part I: The Problem – A Collection of Unmitigated Pedantry
In this three-part series (I, II, III) we’re going to be bowing to reader demand and taking a close look at the nuts and bolts of maintaining an army in the field. In our last series, after all, w…
-
-
>deploy new BGP configuration >leave for lunch >get free cheesesteak because payment system down
-
While compromising SOHO routers as an access vector to gain access to an adjacent LAN is not a novel technique, it has seldom been reported," Black Lotus Labs researchers wrote. "Similarly, reports of person-in-the-middle style attacks, such as DNS and HTTP hijacking, are even rarer and a mark of a complex and targeted operation. The use of these two techniques congruently demonstrated a high level of sophistication by a threat actor, indicating that this campaign was possibly performed by a state-sponsored organization
Brazil has had extremely sophisticated router hacking attacks for the better part of a decade. I’ll grant that they’re not state level sophisticated, but it is false to claim that this methodology is rare.
A wide range of routers are under attack by new, unusually sophisticated malware | Ars Technica
Router-stalking ZuoRAT is likely the work of a sophisticated nation-state, researchers say.
Original:
ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks - Lumen
Executive Summary The rapid shift to remote work in spring of 2020 presented a fresh opportunity for threat actors to subvert traditional defense-in-depth protections by targeting the weakest points of the new network perimeter -- devices which are routinely purchased by consumers but rarely monitored or patched -- small office/home office (SOHO) routers. Actors can
-
-
The dogs face is blurred! lol
-
WILL AI STEAL SUBMARINES’ STEALTH?
Better detection will make the oceans transparent—and perhaps doom mutually assured destruction
Will AI Steal Submarines’ Stealth? - IEEE Spectrum
That may bode ill for nuclear deterrence and the peace of the world
-
-
-
“You alone are responsible for making complete and accurate declarations in your app’s store listing on Google Play.” 😜 arstechnica.com/gadgets/2022/0…
-
Exploring the XBAND Video Game Modem and Executing Arbitrary Code Over a Phone Line in 2022
Exploring the XBAND Video Game Modem and Executing Arbitrary Code Over a Phone Line in 2022 | fresh-eggs.github.io
computers
-
-
The technology involved in making a scary surveillance filled future is quite impressive.
Detroit's new personalized flight information board is straight out of a sci-fi novel - The Points Guy
You can now access innovative technology customized for your traveling needs.
-