<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[CyberSimplified]]></title><description><![CDATA[Demystifying Digital Defence]]></description><link>https://www.cybrsimplified.com</link><image><url>https://substackcdn.com/image/fetch/$s_!A6H8!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1f1320c4-7014-4654-afc0-ab8abf6bc476_256x256.png</url><title>CyberSimplified</title><link>https://www.cybrsimplified.com</link></image><generator>Substack</generator><lastBuildDate>Thu, 30 Apr 2026 10:13:57 GMT</lastBuildDate><atom:link href="https://www.cybrsimplified.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[CyberSimplified]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cybersimplified@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cybersimplified@substack.com]]></itunes:email><itunes:name><![CDATA[Ola Ajanaku]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ola Ajanaku]]></itunes:author><googleplay:owner><![CDATA[cybersimplified@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cybersimplified@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ola Ajanaku]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Security Digest - 24/05/2024]]></title><description><![CDATA[Your weekly dose of cyber awareness.]]></description><link>https://www.cybrsimplified.com/p/the-security-digest-24052024</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/the-security-digest-24052024</guid><pubDate>Fri, 24 May 2024 12:09:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week in Cybersecurity&#8230; &#128478;&#65039;</p><div><hr></div><h3><strong>Strengthen Healthcare Defenses: Embrace Offensive Cybersecurity</strong></h3><p>Healthcare organisations must transition from reactive to proactive cybersecurity strategies to counteract escalating cyber threats. Implementing offensive measures like vulnerability assessments and penetration testing can uncover system weaknesses and improve defences.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="5988" height="3972" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:3972,&quot;width&quot;:5988,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;man wearing white dress shirt&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="man wearing white dress shirt" title="man wearing white dress shirt" srcset="https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1576765607924-3f7b8410a787?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxMnx8aGVhbHRoY2FyZXxlbnwwfHx8fDE3MTY1NDg2MzJ8MA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite challenges such as budget limitations and insufficient expertise, these approaches offer significant benefits, including enhanced security posture, quicker threat response, and improved staff training. Adopting offensive cybersecurity methods is crucial for safeguarding patient data and maintaining healthcare operations.</p><p><strong><a href="https://hitconsultant.net/2024/05/24/why-its-time-to-go-on-the-offensive-with-healthcare-cybersecurity/">READ MORE</a></strong></p><div><hr></div><h3><strong>London Drugs Employee Data Leaked on Dark Web Following Cyberattack</strong></h3><p>London Drugs experienced a significant cybersecurity breach, leading to the leak of employee data on the dark web. The attack forced the retailer to shut down its 80 stores across Western Canada. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!LuLa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!LuLa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!LuLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg" width="600" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!LuLa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 424w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 848w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!LuLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9dedd30-1218-4291-9d7b-340c8d3e0126_600x400.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite efforts to rebuild its data infrastructure and ongoing investigations, no customer data breaches have been confirmed. The company is working with third-party experts to restore operations safely and address the breach's impact, emphasising the protection of its customers and community.</p><p><strong><a href="https://www.theglobeandmail.com/business/article-london-drugs-employee-data-leaked-on-dark-web-after-cybersecurity/">READ MORE</a></strong></p><div><hr></div><h3><strong>Cyberattacks on Water Systems Persist, Warns Cybersecurity Expert</strong></h3><p>Cybersecurity expert Lee McKnight warns that recent cyberattacks on water systems will likely continue, highlighting the sector's vulnerability due to outdated practices. The Environmental Protection Agency (EPA) and the Cybersecurity and Infrastructure Security Agency (CISA) are increasing their efforts to improve cybersecurity in water facilities. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8ZdO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8ZdO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8ZdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg" width="800" height="530" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:530,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;water treatment plant&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="water treatment plant" title="water treatment plant" srcset="https://substackcdn.com/image/fetch/$s_!8ZdO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 424w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 848w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!8ZdO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcee6d144-4ab6-4260-9410-4bb53a9bf301_800x530.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>With 70% of water systems failing to maintain basic cyber hygiene, there is an urgent need for better training and updated security measures to prevent devastating breaches. The expert calls for significant improvements in both public and private sectors to protect critical infrastructure.</p><p><strong><a href="https://techxplore.com/news/2024-05-cyber-wont-cybersecurity-expert.html">READ MORE</a></strong></p><div><hr></div><h3><strong>Deepfakes Surge as Second Most Common Cybersecurity Threat for U.S. Businesses</strong></h3><p>Deepfakes have emerged as the second most common cybersecurity incident for U.S. businesses, following malware infections. Over a third of companies reported experiencing deep fake-related security issues in the past year. These attacks often involve business email compromise (BEC), where AI-generated voice and video content deceives employees into authorising financial transactions. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="3840" height="2160" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:2160,&quot;width&quot;:3840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;a computer generated image of a network and a laptop&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="a computer generated image of a network and a laptop" title="a computer generated image of a network and a laptop" srcset="https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1674027444454-97b822a997b6?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwzMHx8YWl8ZW58MHx8fHwxNzE2NTQ5NTI0fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Additionally, deep fakes pose risks for information theft, reputational damage, and bypassing security measures. To combat these threats, businesses are investing in AI and machine learning technologies, enhancing employee training, and increasing budgets for securing third-party vendor connections.</p><p><strong><a href="https://www.darkreading.com/cyberattacks-data-breaches/deepfakes-rank-as-the-second-most-common-cybersecurity-incident-for-us-businesses">READ MORE</a></strong></p><div><hr></div><h3><strong>CyberArk Acquires Venafi for $1.54B to Strengthen Cybersecurity Offerings</strong></h3><p>CyberArk has acquired cybersecurity provider Venafi for $1.54 billion, enhancing its capabilities in protecting human and machine identities. The acquisition, funded by $1 billion in cash and $540 million in CyberArk shares, aims to address sophisticated cyberattacks by integrating Venafi&#8217;s public key cryptography solutions.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cAFW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cAFW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cAFW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg" width="1100" height="734" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:734,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cAFW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 424w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 848w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!cAFW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12a3acd0-ce3b-40c5-bbea-ca50d771a62a_1100x734.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Venafi's products secure TLS certificates, SSH connections, and code integrity. This acquisition is expected to add $150 million in annual recurring revenue and expand CyberArk's total addressable market by $10 billion.</p><p><strong><a href="https://siliconangle.com/2024/05/20/cyberark-acquires-cybersecurity-provider-venafi-1-54b/">READ MORE</a></strong></p><div><hr></div><h3><strong>PSNI Faces &#163;750,000 Fine for Data Breach Affecting Entire Workforce</strong></h3><p>The Police Service of Northern Ireland (PSNI) is facing a &#163;750,000 fine from the UK's Information Commissioner&#8217;s Office (ICO) due to a data breach that exposed the personal information of its entire workforce last August. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!NVGh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!NVGh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!NVGh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png" width="1200" height="800" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:800,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!NVGh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 424w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 848w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 1272w, https://substackcdn.com/image/fetch/$s_!NVGh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4901dca8-9276-4376-a6fb-b59d32568d2a_1200x800.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The breach highlighted significant lapses in data protection protocols, prompting the ICO to take strict action to ensure compliance and safeguard sensitive information in the future.</p><p><strong><a href="https://www.computing.co.uk/news/4214120/police-service-gbp750k-fine-breach">READ MORE</a></strong></p><div><hr></div><h3><strong>CentroMed Data Breach Exposes Personal Information of 400,000 Individuals</strong></h3><p>CentroMed, a healthcare provider in San Antonio, experienced a data breach compromising the personal and health information of 400,000 individuals. The breach, discovered on May 1, 2024, involved unauthorised access to names, addresses, birthdates, medical details, Social Security numbers, and financial data. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Jm95!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Jm95!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Jm95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg" width="601" height="111" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:111,&quot;width&quot;:601,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;CentroMed Santa Rosa Pavillion &#8211; CentroMed&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="CentroMed Santa Rosa Pavillion &#8211; CentroMed" title="CentroMed Santa Rosa Pavillion &#8211; CentroMed" srcset="https://substackcdn.com/image/fetch/$s_!Jm95!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Jm95!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3841cce8-a6d9-4e22-a51f-1e02a3e1ecdc_601x111.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>CentroMed is notifying affected individuals and advising vigilance in monitoring financial statements. This incident follows a previous breach in 2023 involving 350,000 people.</p><p><strong><a href="https://www.securityweek.com/400000-impacted-by-centromed-data-breach/">READ MORE</a></strong></p><div><hr></div><h3><strong>Optus to Challenge Federal Court Decision Over Deloitte Report in Data Breach Case</strong></h3><p>Optus is set to challenge a Federal Court decision denying its claim of legal professional privilege over a Deloitte report prepared following a major cyberattack in September 2022. The court found that the report, commissioned to identify the causes and improve cyber risk management, was not primarily for obtaining legal advice. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ainp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ainp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ainp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ainp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ainp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ainp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg" width="1200" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Optus partners with Universal Music Australia for a new music offering -  Mediaweek&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Optus partners with Universal Music Australia for a new music offering -  Mediaweek" title="Optus partners with Universal Music Australia for a new music offering -  Mediaweek" srcset="https://substackcdn.com/image/fetch/$s_!ainp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ainp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ainp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ainp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F148b53bf-d0a5-4639-b38c-c083181c3ba1_1200x600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As a result, Optus must produce the report for the ongoing class action lawsuit. This case highlights the complexities of claiming privilege over documents created for multiple purposes.</p><p><strong><a href="https://www.abc.net.au/news/2024-05-23/optus-to-fight-in-federal-court/103885104">READ MORE</a></strong></p><div><hr></div><h3><strong>Kakao Fined $11.1 Million for 2023 Data Breach Affecting 65,000 Users</strong></h3><p>The Personal Information Protection Commission has fined Kakao 15.1 billion won ($11.1 million) for a 2023 data breach that exposed the personal data of over 65,000 users. The breach involved hackers exploiting vulnerabilities in KakaoTalk's open chat service. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Pbqq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Pbqq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 424w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 848w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Pbqq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png" width="1200" height="400" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:400,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Kakao - Wikidata&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Kakao - Wikidata" title="Kakao - Wikidata" srcset="https://substackcdn.com/image/fetch/$s_!Pbqq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 424w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 848w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 1272w, https://substackcdn.com/image/fetch/$s_!Pbqq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9548d3f-76aa-4c93-854e-ce5431dbbfaf_1200x400.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite Kakao's contention that the leaked data did not constitute personal information, the commission held the company accountable for negligence in protecting user data. Kakao plans to challenge the fine legally.</p><p><strong><a href="https://koreajoongangdaily.joins.com/news/2024-05-23/business/industry/Kakao-fined-111-million-for-2023-data-breach/2053426">READ MORE</a></strong></p><div><hr></div><h3><strong>Chinese Hackers 'Unfading Sea Haze' Infiltrate Military and Government Networks for Six Years</strong></h3><p>The cyber-espionage group "Unfading Sea Haze," linked to Chinese interests, has been undetected on military and government networks in the South China Sea region since 2018. Using sophisticated methods such as spear-phishing, file-less malware, and commercial RMM tools, they collected intelligence and maintained persistence. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HaW6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HaW6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HaW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;China-hacker.jpg&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="China-hacker.jpg" title="China-hacker.jpg" srcset="https://substackcdn.com/image/fetch/$s_!HaW6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HaW6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F56ee6b36-dfa9-4a9e-bda4-5b393537612e_1600x900.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The group's activities align with those of known Chinese state-sponsored actors, notably APT41. To counter such advanced threats, organisations are advised to enhance security measures, including patch management, MFA, and network segmentation.</p><p><strong><a href="https://www.bleepingcomputer.com/news/security/unfading-sea-haze-hackers-hide-on-military-and-govt-networks-for-6-years/">READ MORE</a></strong></p><div><hr></div><p><em>Enjoyed this week&#8217;s digest? Why not share it with a friend? Let these topical events lead your security conversations, and become the expert. Oh, and don&#8217;t forget to subscribe :)</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybrsimplified.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[🔥🎬 - Is Public Wi-Fi Safe?]]></title><description><![CDATA[Hot Take #3]]></description><link>https://www.cybrsimplified.com/p/is-public-wi-fi-safe</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/is-public-wi-fi-safe</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Wed, 22 May 2024 06:01:02 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/1c44313b-80f6-47c1-b108-b64a4218c716_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>&#8220;Some believe that simply ensuring the use of HTTPS while searching websites, especially for public Wi-Fi, ensures complete safety from hackers who might steal banking information, passwords, and personal data. Isn&#8217;t public Wi-Fi hacking a concern of the past?&#8221; - Anon</em></p><div><hr></div><p><strong>Thoughts&#8230; &#128173;</strong></p><p>Maybe you&#8217;ve thought about this, maybe you haven&#8217;t.</p><p>To answer the question in short, no public Wi-Fi is not &#8216;safe&#8217;, regardless of whether it&#8217;s a secured or unsecured network. </p><p>The potential dangers of using public Wi-Fi, such as the risk of having your banking information, passwords, and personal data stolen, should be a cause for concern. You may not have suffered any breaches (to your knowledge), but that cannot be any reasonable person&#8217;s yardstick for safety.</p><p>I know people who often drive without a seatbelt and have not yet suffered any accidents&#8230; Do you see where I&#8217;m going here?</p><p>Most public Wi-Fi networks don't require a password or use weak encryption, making it easy for cybercriminals to intercept your data through man-in-the-middle attacks (MitM). </p><p>On a Saturday a few years ago, I was sitting in Starbucks waiting for a friend when I glanced over my shoulder to see a 20-something-year-old man performing some bash scripting on Kali Linux &#8212; I have no idea what he was doing, but I do know <em>that</em> Starbucks had public Wi-Fi.</p><p>Even with a password, older encryption protocols like <strong>WEP</strong> (Wired Equivalent Privacy) and <strong>WPA</strong> (Wi-Fi Protected Access) have known vulnerabilities that can be exploited. To be honest, you shouldn&#8217;t even be using these anymore&#8212;I&#8217;d stick to <strong>WPA2</strong> (Wi-Fi Protected Access 2).</p><p>Having said that, in 2017, a vulnerability called KRACK (Key Reinstallation Attack) allowed hackers to exploit the four-way handshake WPA2 encryption uses to establish an encrypted connection. </p><p>The preferred option, however, is <strong>WPA3</strong>, where it&#8217;s available.</p><p>Session hijacking (or cookie hijacking) is another popular activity hackers love to do where they can, and public Wi-Fi will always be a prime location for carrying out black hat activities. The myth of HTTPS as a silver bullet to protect from all attacks is nothing but laughable to a skilled hacker.</p><p>Sure, HTTPS is great for encrypting data in transit, among a couple of other things. But it can&#8217;t protect against malware being injected into the website or transmitted through the connection. It can&#8217;t protect against server-side vulnerabilities like SQL injection or cross-site scripting (XSS). It can&#8217;t protect against DNS attacks like DNS spoofing. It can&#8217;t even fully protect against MitM attacks! It just makes it more difficult.</p><p>How can we improve our security posture when we&#8217;re out and about?</p><p>The concept of <strong>Defence-in-Depth</strong> springs to mind! Implement as many as possible to reduce the attack surface.</p><ol><li><p><strong>Use a VPN</strong>: These make it even harder for a &#8216;man&#8217; to be in the middle of your communications with the server.</p></li><li><p><strong>Avoid Sensitive Activities</strong>: Think. It may not be a good idea to be accessing sensitive information from a public Wi-Fi connection?</p></li><li><p><strong>Use Secure Connections</strong>: HTTPS-only connections. I know I&#8217;ve just criticised them, perhaps harshly, but they are still strong for Encryption, Authentication, and Integrity.</p></li><li><p><strong>Software Updates</strong>: Don&#8217;t ignore the notifications; it could cost you. Update your operating system, browser, and antivirus software if you have this.</p></li><li><p><strong>Multi-Factor Authentication (MFA)</strong>: Wherever possible, enable MFA to add an additional layer of security.</p></li><li><p><strong>Have Wits</strong>: Simply, if a public Wi-Fi network seems suspicious to you or has weak security, move on.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oMWl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oMWl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 424w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 848w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 1272w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oMWl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp" width="800" height="618" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:618,&quot;width&quot;:800,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:133312,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/webp&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oMWl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 424w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 848w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 1272w, https://substackcdn.com/image/fetch/$s_!oMWl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe2b0b04c-4ed6-477d-a00d-6feffcc97351_800x618.webp 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the end, it's not about whether public Wi-Fi is safe or not. It's about understanding the risks and taking proactive measures to protect yourself because the convenience of public Wi-Fi comes with a price&#8212;your security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CyberSimplified! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[See Threats Before They Strike!]]></title><description><![CDATA[Strengthening Defences, Anticipating Attacks.]]></description><link>https://www.cybrsimplified.com/p/see-threats-before-they-strike</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/see-threats-before-they-strike</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Mon, 20 May 2024 06:01:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!slsW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Screen Shadows &#128373;&#127996;&#8205;&#9794;&#65039;</strong></h3><blockquote><p><em>&#8220;Heartbleed was the internet's surprise colonoscopy, revealing the embarrassing vulnerabilities we never bothered to look for.&#8221; - CS</em></p></blockquote><p><strong>Picture this:</strong> A critical flaw in OpenSSL, a widely used encryption software, remained undiscovered for two years. Known as Heartbleed, this vulnerability allowed attackers to access sensitive information undetected. OpenSSL is essential for securing online communications, but this flaw, caused by a simple programming error, exposed a significant weakness.</p><p>When Heartbleed was discovered, it highlighted the mistaken belief that this security measure was infallible. The breach exposed private conversations, sensitive data, user passwords, and encryption keys, leading to a widespread scramble to update passwords and secure systems.</p><p>Heartbleed's legacy is a stark reminder that vigilance is priceless in our fast-evolving digital world, and even the smallest oversight can lead to monumentally upsetting breaches.</p><div><hr></div><h3>TL;DR &#8987;&#65039;</h3><p>Threat modelling is essential in cybersecurity, a dynamic strategy for outsmarting cyber threats by understanding and preparing for them. Unlike financial modelling&#8217;s one-size-fits-all approach, threat modelling is a tailored, active process. It&#8217;s a blend of proactive design (Secure by Design) and reactive measures (Threat Hunting), ensuring digital assets are safeguarded from the get-go and continuously monitored. </p><p>Effective threat modelling demands a security mindset, understanding system vulnerabilities through methods like FTA and FMEA, and recognising the importance of accident prevention and deliberate attack mitigation. It involves mapping potential attacks, dissecting our digital systems to pinpoint vulnerabilities, prioritising threats, and crafting intelligent defences. </p><p>Frameworks like PASTA and STRIDE offer systematic ways to uncover and mitigate risks. Remember, cybersecurity is a journey of constant learning and adaptation, with threat modelling at its core.</p><div><hr></div><h3><strong>&#128680; Security Briefing &#128680;</strong></h3><p><strong>Threat modelling</strong> is a term often used by professionals (even some security professionals) but is not well understood. When I first heard it, I tried to liken it to financial modelling, as I&#8217;d done so much of this after I became a qualified accountant. Depending on your objective for the model you&#8217;re trying to build, there are many templates for financial models.</p><p>I was mistaken to try and apply the same concept to cybersecurity as here; we&#8217;re dealing with something quite different. Where financial modelling is often an out-the-box exercise where you can simply manipulate inputs for your own use-case, threat modelling is a highly tailored exercise, and one which is as active and dynamic as the four seasons. &#127810;&#127774;&#10052;&#65039;&#127799;</p><p>So, with that said let&#8217;s see what&#8217;s on the menu today. We&#8217;ll be covering&#8230;</p><ul><li><p>What threat modelling is.</p></li><li><p>How we should think about approaching threat modelling.</p></li><li><p>The key practical considerations.</p></li><li><p>Prioritising and responding to identified threats.</p></li></ul><p>Without further adieu&#8230;</p><p></p><h3>Threat Modelling Decoded &#128104;&#127996;&#8205;&#128187;</h3><p><strong>Threat Modelling Defined:</strong></p><p>In the cybersecurity realm, the overarching objective is to keep our assets safe from those with malicious intent (or those accessing information without authorised purpose). At the heart of this endeavour lies the practice of <em>threat modelling, an</em> indispensable strategy that helps us foresee and outsmart potential cyber threats.</p><p><strong>Conceptually simple. Pragmatically involved.</strong></p><p>This isn't merely about putting up firewalls and calling it a day; it's a methodical process of <strong>identifying, classifying, and evaluating</strong> threats to ensure our virtual valuables are well-protected.</p><p>Think of threat modelling as a two-part harmony. </p><p>On one side, we have the <strong>defensive strategy &#128737;&#65039;</strong>, similar to designing a medieval castle with defence in mind right from the drawing board. This approach, taken during the earliest stages of system development, involves anticipating potential cyber-attacks and weaving in defences as we build. It's all about being one step ahead, ensuring that security is a <em>fundamental</em> aspect of the system's design, effectively reducing the chances and impacts of any digital breach. This preventive measure is not just savvy; it's cost-effective too, saving resources that might otherwise be spent &#8216;sticking&#8217; on security measures after the system has been built.</p><p>Utilising frameworks like STRIDE or PASTA and tools such as Microsoft Threat Modeling Tool or OWASP Threat Dragon allows for a systematic analysis of threats.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!slsW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!slsW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 424w, https://substackcdn.com/image/fetch/$s_!slsW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 848w, https://substackcdn.com/image/fetch/$s_!slsW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!slsW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!slsW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:565349,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!slsW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 424w, https://substackcdn.com/image/fetch/$s_!slsW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 848w, https://substackcdn.com/image/fetch/$s_!slsW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!slsW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1876baea-0188-4a63-975b-da566e4ff1b4_500x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>On the flip side, we explore the <strong>adversarial strategy &#128481;&#65039;</strong>, which kicks in post-deployment (this is after a product has been created and deployed, even if only in a test environment). This is where the cybersecurity militia don their white hats, engaging in ethical hacking and penetration testing to hunt down and fix vulnerabilities. It&#8217;s a bit like checking the locks and alarms after the house is built. Although invaluable in shoring up defences, this reactive measure often involves patching up security holes discovered after the fact, which is a bit like playing catch up.</p><p>This strategy relies heavily on tools and methodologies designed to identify and exploit weaknesses, such as Metasploit, Burp Suite, and Nmap. Penetration testers use these tools to simulate real-world attacks, uncovering vulnerabilities that could be exploited by malicious actors.&nbsp;</p><p>Unsurprisingly, the comprehensive and most robust approach is a combination of the two. </p><div class="pullquote"><p><em><strong>Secure by Design</strong> (defensive) <strong>+</strong> <strong>Threat Hunting</strong> (reactive) <strong>= Security Personified</strong></em></p></div><p>By integrating proactive security considerations into the design process and complementing them with vigilant, ongoing scrutiny, we enhance our shield against cyber threats. This dual approach not only aims to minimise the number of security flaws but also to dampen the impact of any that might slip through the net&#8212;which is bound to have some holes, of course.</p><p></p><p><strong>NB - Security State of Mind:</strong></p><p>Before diving headfirst into the deep end of threat modelling, it's crucial to set the scene. Understanding the security landscape and our objectives lays the groundwork for effective defence strategies.</p><p>Two seasoned methods stand out when it comes to dissecting potential system vulnerabilities: <strong>Fault Tree Analysis</strong> (FTA) and <strong>Failure Mode and Effects Analysis</strong> (FMEA). Both demand a thorough understanding of the systems at hand and a recognition that automation has its limits, given the complexity and potential for change within any given system.</p><p>Automation is incredibly brilliant and all, but it <strong>isn&#8217;t </strong>magic&#8212;it still depends on integration with systems, pre-defined rules and machine learning capabilities.</p><p>Our quest for security doesn't stop at just safeguarding against deliberate attacks, either; it, of course, extends to accidents and human error, too. This is where application-specific knowledge gained over time is of prime value in security. Partner with such people when working on security-related problems, they&#8217;ll accelerate the learning process.</p><p>Take the automotive industry, for example, Tesla, more specifically. The increasing reliance on electronic systems in their cars means that traditional safety checks, such as ensuring headlamps work correctly, now need to incorporate considerations of cybersecurity threats. Imagine a filthy hacker taking control of your Tesla&#8217;s entertainment system, and while you&#8217;re bombing it down the highway at 125 mph &#127950;&#65039;&#128739;&#65039; (on the Autobahn, of course), he switches off the headlamps&#8212;a risk that could be mitigated by introducing firewalls within Tesla&#8217;s network, as an example. </p><p>But if you&#8217;re not thinking in this way, how will you effectively defend against threats?</p><p>Navigating the intricate landscape of modern system security calls for both a structured and dynamic approach, aligning our protective measures with clearly defined objectives and a strategic risk management plan. Is there one way to do this? Absolutely not! This is why we must adopt a <strong>security state of mind.</strong></p><p></p><p><strong>Mapping the Attacker's Mind</strong></p><p>The next step in threat modelling is to determine the potential types of attacks that could be waged against us. </p><p>The <strong>first </strong>step is to create a (sometimes not-so-simple) map or diagram that shows how information moves in a system. For example, the paths data takes during an online transaction or how data is shared between your computer and the Internet. </p><p>This map helps highlight the system's key parts, where it's vulnerable, and where we need to tighten security.</p><p>This isn't about delving into the nitty-gritty of computer code; rather, it's a bird's-eye &#129413;&#128065;&#65039; view of where our system's digital walls and gates lie. For more complicated setups, we might need several of these maps, zooming in on different security zones to catch the important areas.</p><div class="pullquote"><p><strong>Security Zone:</strong><br>A network segment with specific security controls to regulate access and protect sensitive information.<br><br>-OR-<br><br>A protected area in a computer network where special rules keep information safe</p></div><p>Once our map is ready, the <strong>second </strong>step is to pinpoint every piece of technology on it. <strong>Third</strong>, we brainstorm all the ways someone could launch an attack on each part, considering not just hacking attempts but also physical break-ins or other deceptive techniques like phishing scams. This mapping and brainstorming lay the groundwork for moving to the next stage&#8212;figuring out how to reduce these threats.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Myjs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Myjs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 424w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 848w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Myjs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png" width="500" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:407263,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Myjs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 424w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 848w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 1272w, https://substackcdn.com/image/fetch/$s_!Myjs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd224426c-9e7a-4119-ad3a-eafc30f7f192_500x500.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The <strong>fourth</strong> stage in threat modelling is to perform a <em>reduction analysi</em>s, or as I like to call it, the art of cyber dissection &#128298;. Imagine taking a complex system&#8212;be it software, a network, or even an entire business setup&#8212;and breaking it down into bite-sized pieces. It's akin to dismantling a watch to understand how each cog and wheel (component) contributes to telling time (objective), except here, we're unravelling the digital threads that make our systems tick, which can be very time-consuming if the system is complex.</p><p>This meticulous breakdown helps us examine the inner workings of our digital beasts, from the small routines in software to the big protocols governing networks. By segmenting our focus, we can scrutinise how data dances &#128131;&#127996; from one point to another, how decisions &#128506;&#65039; are made within the system, and how securely &#128274; information is stored and managed.</p><p>Key to this process are a few navigational concepts:</p><ul><li><p><strong>Trust Boundaries</strong>: These are the digital 'Do Not Cross' tapes, marking where we ramp up our security checks as trust levels increase.</p></li><li><p><strong>Dataflow Paths</strong>: The highways and byways along which our data zips, carrying information from A to B.</p></li><li><p><strong>Input Points</strong>: Our system's mailboxes, where we receive external information, and yes, sometimes spam.</p></li><li><p><strong>Privileged Operations</strong>: Think of these as VIP access areas, where only the high-flyers with special passes (higher privileges) can make significant changes.</p></li><li><p><strong>Security Stance and Approach</strong>: Our manifesto, outlining how we plan to defend our digital domain, from the ground rules to the lofty ideals.</p></li></ul><p>By dissecting our systems in this way, we not only understand their anatomy but also prepare better defences against the cyber threats lurking in the shadows.</p><p></p><p><strong>Prioritisation and Response</strong></p><p>Now we've got all our potential cyber threats down on paper; the next crucial step is figuring out which ones we should lose sleep over &#128164;. This is where we start ranking these threats. There are a few ways to do this, and it's not one-size-fits-all, as with anything in cybersecurity. One popular method gives threats scores from 1 to 100, mixing how likely they are to happen with how much havoc they could wreak.</p><p>Another method uses a simpler approach, tagging threats as high, medium, or low risk, similar to categorising them into the red, yellow, or green traffic light system &#128678;. This creates a sort of danger map, showing us where the biggest fires could start so we know where to focus our firefighting efforts. Then there's the <strong>DREAD</strong> system, which sounds as ominous as it is for those often malevolent hackers &#129399;&#127996;. It asks five critical questions about each threat, from "How bad would the damage be?" to "How easy is it for bad actors to find and exploit this weakness?"</p><p>Once we've decided which threats are the meanest, it&#8217;ll be time to plan our counter. This could mean tweaking our digital defence, changing how we do things day-to-day, or introducing new so-called shields and watchtowers in our cybersecurity setup. It's all about finding the smartest, efficient and most cost-effective way to keep our most valuable assets safe.</p><p></p><p><strong>Common Examples:</strong><br><br>Two common frameworks you're likely to encounter in threat modelling are <strong>PASTA</strong> and <strong>STRIDE</strong>. Each offers a distinct pathway for navigating the complex landscape of digital threats by helping to uncover and mitigate potential vulnerabilities in a systematic way. PASTA, which stands for Process for Attack Simulation and Threat Analysis, takes a risk-centered approach, weaving together business objectives with technical analysis across seven detailed steps.</p><p>Meanwhile, STRIDE breaks down threats into six categories: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege. Developed by the tech giant Microsoft, STRIDE simplifies the process of identifying potential threats by giving teams a clear framework to categorise and tackle each type of risk. When STRIDE and PASTA are employed together, they provide a holistic view of both the forest and the trees: STRIDE focuses on the technical details of potential vulnerabilities, while PASTA aligns threat modelling with business impacts.</p><p>&#8230;.and besides, who doesn&#8217;t like pasta? &#127837;</p><p></p><h3>Conclusion</h3><p>This serves as a pretty sensible introduction to threat modelling if I do say so myself. It&#8217;s also a very practical way to prepare for an interview, enter an organisation, or engage in a conversation and be equipped with the general and somewhat specialist knowledge to add value to the discussion, but it&#8217;s important that your understanding of threat modelling does not end here.</p><p>You see, cybersecurity is a lifelong journey of learning and adapting, and threat modelling encompasses much of that because it&#8217;s so vast and is, by nature, woven into the very tapestry of security.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CyberSimplified! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Security Digest - 10/05/2024]]></title><description><![CDATA[Your weekly dose of cyber awareness.]]></description><link>https://www.cybrsimplified.com/p/the-security-digest-10052024</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/the-security-digest-10052024</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Fri, 10 May 2024 06:01:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uypq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week in Cybersecurity&#8230; &#128478;&#65039;</p><div><hr></div><h4>Major Data Breach Compromises Personal Details of UK Military Personnel</h4><p>A significant data breach has compromised the personal details of UK military personnel. The breach involved a payroll system managed by an external contractor. The exposed data includes the names, bank details, and, in some cases, personal addresses of current and former members of the Royal Navy, Army, and Royal Air Force. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uypq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uypq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 424w, https://substackcdn.com/image/fetch/$s_!uypq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 848w, https://substackcdn.com/image/fetch/$s_!uypq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 1272w, https://substackcdn.com/image/fetch/$s_!uypq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uypq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg" width="412" height="332.4862637362637" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1175,&quot;width&quot;:1456,&quot;resizeWidth&quot;:412,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Ministry of Defence (United Kingdom) - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Ministry of Defence (United Kingdom) - Wikipedia" title="Ministry of Defence (United Kingdom) - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!uypq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 424w, https://substackcdn.com/image/fetch/$s_!uypq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 848w, https://substackcdn.com/image/fetch/$s_!uypq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 1272w, https://substackcdn.com/image/fetch/$s_!uypq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fff2fecac-ee41-46b6-91d7-2d12f1a74d38_352x284.svg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The Ministry of Defence (MoD) has taken the affected system offline. It is currently investigating, with Defence Secretary Grant Shapps set to discuss the incident and proposed security measures in an upcoming parliamentary update. This breach underscores ongoing cyber-security concerns amidst increasing threats.</p><p><strong><a href="https://www.bbc.co.uk/news/uk-68966497">READ MORE</a></strong></p><div><hr></div><h4>The Strategic Role of Open Source Intelligence in Enhancing Cybersecurity</h4><p>This article from SpecialEurasia discusses the critical role of Open Source Intelligence (OSINT) in modern cybersecurity frameworks. It explains how OSINT contributes to penetration testing, red teaming, digital forensics, and threat intelligence by leveraging publicly available data to identify and mitigate security vulnerabilities. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!taDm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!taDm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 424w, https://substackcdn.com/image/fetch/$s_!taDm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 848w, https://substackcdn.com/image/fetch/$s_!taDm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!taDm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!taDm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg" width="606" height="341.0914285714286" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:788,&quot;width&quot;:1400,&quot;resizeWidth&quot;:606,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Discover the Top 10 Blogs to Keep You Up to Date on OSINT | by Diego Michel  | Medium&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Discover the Top 10 Blogs to Keep You Up to Date on OSINT | by Diego Michel  | Medium" title="Discover the Top 10 Blogs to Keep You Up to Date on OSINT | by Diego Michel  | Medium" srcset="https://substackcdn.com/image/fetch/$s_!taDm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 424w, https://substackcdn.com/image/fetch/$s_!taDm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 848w, https://substackcdn.com/image/fetch/$s_!taDm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!taDm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7fb0592-3160-456a-8ac5-42469a6c92a5_1400x788.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Real-world examples highlight OSINT's practical applications in safeguarding against cyber threats, emphasising its importance in a comprehensive cybersecurity strategy and the ongoing battle against cybercrime.</p><p><strong><a href="https://www.specialeurasia.com/2024/05/06/cybersecurity-osint/">READ MORE</a></strong></p><div><hr></div><h4>The Rising Cybersecurity Concerns for Children in the Digital Age</h4><p>As discussed in a recent Newstalk article, the cybersecurity of children has become a pressing concern for both parents and policymakers. The digital age has brought unique challenges that require vigilant supervision and proactive educational efforts. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pnAe!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pnAe!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pnAe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg" width="414" height="414" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:500,&quot;resizeWidth&quot;:414,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;CyberSafeKids - Cyber Ireland&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="CyberSafeKids - Cyber Ireland" title="CyberSafeKids - Cyber Ireland" srcset="https://substackcdn.com/image/fetch/$s_!pnAe!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!pnAe!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F755612cb-7cec-49c1-a80e-ea987b0a7d72_500x500.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Alex Cooney, CEO of CyberSafeKids, highlights the urgency of addressing these issues, emphasising the widespread use of smart devices by children from a very young age and calling for an increased focus on digital safety measures to protect the vulnerable in our increasingly connected world.</p><p><strong><a href="https://www.newstalk.com/news/cybersecurity-of-children-a-huge-problem-for-parents-and-policymakers-1722676">READ MORE</a></strong></p><div><hr></div><h4>Microsoft Commits to Comprehensive Cybersecurity Overhaul</h4><p>Microsoft has announced extensive cybersecurity improvements following severe critiques of its security practices highlighted by the Cyber Safety Review Board. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e2ZG!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e2ZG!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e2ZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg" width="1456" height="535" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:535,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Microsoft Unveils a New Look - The Official Microsoft Blog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Microsoft Unveils a New Look - The Official Microsoft Blog" title="Microsoft Unveils a New Look - The Official Microsoft Blog" srcset="https://substackcdn.com/image/fetch/$s_!e2ZG!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 424w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 848w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!e2ZG!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5e957c61-7eb7-44f9-a4e2-5aa7cfd87ae5_4400x1617.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The initiatives, led by Microsoft Security EVP Charlie Bell, include assigning deputy CISOs to every product team, tying a portion of senior leaders' salaries to cybersecurity advancements, and bolstering the Secure Future Initiative. This strategic push aims to enhance cloud vulnerability patching, improve identity management, and organise software assets, reflecting Microsoft&#8217;s prioritisation of security over all other product features.</p><p><strong><a href="https://www.scmagazine.com/brief/sweeping-cybersecurity-improvements-pledged-by-microsoft">READ MORE</a></strong></p><div><hr></div><h4>The High Cost of Cyber Insecurity: Financial Implications for SMBs</h4><p>A recent report from The Hacker News details the daunting financial burdens that cyberattacks impose on small and medium-sized businesses (SMBs). The analysis underscores that the costs of recovering from cyber incidents frequently exceed those of preemptive cybersecurity investments. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CqZN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CqZN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 424w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 848w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 1272w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CqZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp" width="500" height="212" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:212,&quot;width&quot;:500,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Hacker News to Kafka - Precog&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Hacker News to Kafka - Precog" title="Hacker News to Kafka - Precog" srcset="https://substackcdn.com/image/fetch/$s_!CqZN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 424w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 848w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 1272w, https://substackcdn.com/image/fetch/$s_!CqZN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3915a7b8-469e-45cc-b7d1-83b3eaa8caa2_500x212.webp 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The article indicates that many SMBs lack sufficient cybersecurity infrastructure, including dedicated personnel and comprehensive incident response strategies. It recommends that SMBs adopt managed endpoint detection and response (EDR) solutions as a cost-effective measure to fortify their defences against escalating cyber threats.</p><p><strong><a href="https://thehackernews.com/2024/05/it-costs-how-much-financial-pitfalls-of.html">READ MORE</a></strong></p><div><hr></div><h4>Indonesia Identified as a Hub for International Spyware Trade</h4><p>Amnesty International's latest research reveals Indonesia as a significant hub for distributing invasive surveillance technologies. According to the report, since 2017, Indonesia has imported spyware from countries including Israel and Singapore, involving companies like Q Cyber-Technologies and FinFisher. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!AiPP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!AiPP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!AiPP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg" width="548" height="331" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:331,&quot;width&quot;:548,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Indonesia: Murky network of spyware imports exposed - new report&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Indonesia: Murky network of spyware imports exposed - new report" title="Indonesia: Murky network of spyware imports exposed - new report" srcset="https://substackcdn.com/image/fetch/$s_!AiPP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 424w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 848w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!AiPP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F153f2977-bd0f-4f44-9a2d-9b8fde08b824_548x331.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The spyware, used to mimic political and media entities, poses a severe risk to civil liberties, mainly targeting journalists and activists. Amnesty emphasises the need for accountability to protect civil society from unlawful surveillance threats in Indonesia.</p><p><strong><a href="https://www.darkreading.com/cybersecurity-operations/amnesty-international-cites-indonesia-as-spyware-hub">READ MORE</a></strong></p><div><hr></div><h4>UnitedHealth Pays $22 Million Ransom in Major Healthcare Cyberattack</h4><p>UnitedHealth Group CEO Andrew Witty confirmed that the company paid a $22 million ransom following a cybersecurity breach at its subsidiary Change Healthcare. The breach, which compromised patient and provider data, led to significant disruptions, including prescription fillings and payments issues. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J2W4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J2W4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 424w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 848w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 1272w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J2W4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png" width="370" height="176.36666666666667" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:143,&quot;width&quot;:300,&quot;resizeWidth&quot;:370,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;UnitedHealth Group Is Worth $70 On Health Insurance Enrollments Growth&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="UnitedHealth Group Is Worth $70 On Health Insurance Enrollments Growth" title="UnitedHealth Group Is Worth $70 On Health Insurance Enrollments Growth" srcset="https://substackcdn.com/image/fetch/$s_!J2W4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 424w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 848w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 1272w, https://substackcdn.com/image/fetch/$s_!J2W4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a709892-0296-43a7-a0ba-f051ef93fec6_300x143.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Addressing the U.S. Senate Committee on Finance, Witty disclosed that the breach was due to inadequate security measures, specifically the lack of multi-factor authentication. UnitedHealth has since improved security protocols and is collaborating with regulators to mitigate the fallout and prevent future incidents.</p><p><strong><a href="https://www.cnbc.com/2024/05/01/unitedhealth-ceo-says-company-paid-hackers-22-million-ransom.html#:~:text=UnitedHealth%20Group%20CEO%20Andrew%20Witty%20confirmed%20for%20the%20first%20time,across%20the%20health%2Dcare%20sector.">READ MORE</a></strong></p><div><hr></div><h4>Dell Alerts 49 Million Users to a Monumental Data Breach</h4><p>Dell has issued warnings to 49 million customers about a significant data breach. A hacker claimed to have accessed a vast amount of personal information, including purchase data, through unauthorised access to a Dell portal. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!35TP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!35TP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 424w, https://substackcdn.com/image/fetch/$s_!35TP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 848w, https://substackcdn.com/image/fetch/$s_!35TP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 1272w, https://substackcdn.com/image/fetch/$s_!35TP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!35TP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png" width="1200" height="364" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:364,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;File:Dell Logo.png - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="File:Dell Logo.png - Wikipedia" title="File:Dell Logo.png - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!35TP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 424w, https://substackcdn.com/image/fetch/$s_!35TP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 848w, https://substackcdn.com/image/fetch/$s_!35TP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 1272w, https://substackcdn.com/image/fetch/$s_!35TP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9ab09415-21b0-4e55-bd8a-b08c0682319a_1200x364.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The stolen data includes names, addresses, and details of purchased hardware, though no financial data was compromised. Dell has responded by engaging a third-party forensics firm, implementing incident response measures, and notifying law enforcement, assuring that the risk to customers remains minimal.</p><p><strong><a href="https://readwrite.com/dell-warns-49-million-customers-about-massive-data-breach/">READ MORE</a></strong></p><div><hr></div><p><em>Enjoyed this week&#8217;s digest? Why not share it with a friend? Let these topical events lead your security conversations, and become the expert. Oh, and don&#8217;t forget to subscribe :)</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybrsimplified.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[🔥🎬 - Stopping SQL Injection Attacks]]></title><description><![CDATA[Hot Take #2]]></description><link>https://www.cybrsimplified.com/p/stopping-sql-injection-attacks</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/stopping-sql-injection-attacks</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Wed, 08 May 2024 06:01:06 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/585ab613-a075-4cdd-9e40-2a15de5dcfd0_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>&#8220;I was reviewing the details of the MOVEit data breach in May 2023, which resulted from an SQL injection attack. Since SQL injection vulnerabilities were first identified in 1998, it is concerning that this type of security flaw still presents issues in 2024, as evidenced by another similar attack a few weeks ago. I am seeking clarification on why this longstanding vulnerability continues to be a problem despite its long-standing recognition and the availability of well-documented prevention techniques.&#8221; - Anon</em></p><div><hr></div><p><strong>Thoughts&#8230; &#128173;</strong></p><p>According to a 2023 report by Statista, SQL Injection is the <strong>primary source of web application critical vulnerabilities globally</strong>, accounting for 23% of such vulnerabilities. </p><p>For context, there are <em>thousands</em> of critical vulnerabilities that exist in web applications worldwide, so this is a pretty big deal.</p><p>For the record, an SQL injection is where an attacker manipulates a website into running malicious commands by inserting (or "injecting") these commands into places where the website expects to receive harmless inputs, like a username or password field.</p><p>These injections can allow the attacker to view, change, or delete data from the underlying database that they shouldn't have access to, such as personal information or financial details.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gyTr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gyTr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 424w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 848w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 1272w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gyTr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png" width="666" height="205" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:205,&quot;width&quot;:666,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Exploits of a Mom&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Exploits of a Mom" title="Exploits of a Mom" srcset="https://substackcdn.com/image/fetch/$s_!gyTr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 424w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 848w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 1272w, https://substackcdn.com/image/fetch/$s_!gyTr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc32ae0f5-882a-42a1-a8fb-8249238b6f2a_666x205.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a><figcaption class="image-caption"><a href="https://xkcd.com/327/">xkcd</a></figcaption></figure></div><p>Database admins and programmers are not necessarily security professionals, and it&#8217;s common to find that they are a long way behind in keeping up with best security practices. We need to adopt more secure coding practices across the board, even if it's a development database, especially regarding SQL Injection attacks.</p><p>So how do we solve it?</p><p>Here are two simple ways:</p><ol><li><p><strong>Parameterized Queries:</strong> These tools ensure attackers can't alter a query's purpose by inserting harmful SQL commands. For instance, if a hacker tries to manipulate a search term, parameterized queries treat the input literally, searching for the exact string rather than executing any part of it as a command. Even if a user inputs something malicious, it will be treated as plaintext rather than executable SQL.</p><p></p></li><li><p><strong>Input Validation</strong>: By implementing input validation techniques like whitelisting (allowing only safe inputs) and blacklisting (blocking dangerous inputs), you can ensure that only appropriate and expected data is processed in your SQL queries.<br><br>For example, suppose you have a website form where users can select a country from a list to perform a search. To ensure only valid data is submitted, you create a list of acceptable country names, such as "USA," "Canada," and "Mexico." When a user submits their form, the system checks if the country they entered is on this approved list. If it is, the search goes ahead; if not, the input is rejected.</p></li></ol><p>By following these best practices, you can secure your application against SQL Injection attacks.</p><h6></h6><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybrsimplified.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[Data Classification - Securing What Matters]]></title><description><![CDATA[The First Line of Data Defence.]]></description><link>https://www.cybrsimplified.com/p/data-classification-securing-what</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/data-classification-securing-what</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Mon, 06 May 2024 06:00:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DGN0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Screen Shadows &#128373;&#127996;&#8205;&#9794;&#65039;</strong></h3><blockquote><p><em>Four years unseen, the hackers played, <br>A ghostly dance, their plans were laid. <br>Names and numbers, spoils so bright,<br>Passport dreams took sudden flight.<br></em>- CS</p></blockquote><p><strong>Picture this:</strong> In 2018, Marriott International faced a cybersecurity nightmare when a colossal data breach exposed up to 500 million guests' personal details. This digital disaster traced its roots to the 2016 merger with Starwood Hotels, where a crucial misstep occurred: Starwood's IT systems were left vulnerable and not fully woven into Marriott's security fabric. </p><p>The insult to injury was that hackers had been lurking in Starwood's reservation systems since 2014, a shadowy presence overlooked during Marriott's acquisition. The oversight proved costly, granting cyber thieves a criminal&#8217;s paradise of data, from passport numbers to payment details. </p><p>Recognised as one of history's most extensive data breaches, the fallout was profound for Marriott&#8212;a staggering $30 million in damage control, a stock plummet of 5%, over $1 billion in revenue losses, a flurry of lawsuits, and a hefty &#163;18.4 million fine from UK regulators. </p><p>Marriott's ordeal with Starwood's legacy systems serves as a stark reminder of the dire consequences of underestimating cybersecurity's pivotal role in mergers and acquisitions.</p><div><hr></div><h3>TL;DR &#8987;&#65039;</h3><p>Security isn't free&#8212;it's a vital investment for safeguarding a company's crown jewels: its data. Identifying what to protect is step one, categorising data from "must-guard-with-our-lives" to "okay-to-share." This isn't just about state-of-the-art tech; it's perhaps more importantly about the goldmine of data accessed through them.</p><p>For businesses, it's about securing the protect surface, whether it&#8217;s confidential strategic plans or intellectual property. In the government realm, think classified levels, from "Top Secret" nuclear codes to everyday recruitment flyers. The guardians? Data owners decide what's sensitive, while data custodians keep it safe.</p><p>Bottom line&#8212;Security is pricey, but knowing what's crucial ensures we're not throwing money into a digital black hole. Let's invest wisely, protecting what truly matters.</p><div><hr></div><h3><strong>&#128680; Security Briefing &#128680;</strong></h3><p>Security is <em><strong>not</strong> </em>FREE. </p><p>Yeah, obvious, I know, but I think it&#8217;s important that people understand it can be expensive to implement security, and even big companies don&#8217;t have a bottomless pit of funds they can just reach into and use for whatever they wish.</p><p>We need to know exactly which assets are worth the expense of securing due to the very nature of their sensitivity. How do we do this? Well, we first need to identify all of our assets (which also include information and data). Then, we&#8217;ll need to classify them accordingly from the most critical to the least critical. Here&#8217;s what we&#8217;ll cover:</p><ul><li><p>What is the difference between an asset, information and data?</p></li><li><p>What the deal is about identifying assets.</p></li><li><p>What data classifications are; and</p></li><li><p>How we typically define them in companies.</p></li></ul><p>Without further adieu&#8230;</p><p></p><h3>Asset Classification Decoded &#128104;&#127996;&#8205;&#128187;</h3><p><strong>ASSETS, INFORMATION, &amp; DATA</strong> are often used interchangeably in everyday cybersecurity vernacular, but they are technically distinct.</p><p>Let&#8217;s start in reverse order for a more logical explanation:</p><p><strong>What do we mean by &#8216;Data&#8217;?</strong></p><p>In the world of cybersecurity, grasping the distinction between data and information is akin to understanding the difference between a sack of flour and a loaf of bread. Data, in its true essence, is like that sack of flour&#8212;raw, unrefined, and without much use in its current state. These can be <strong>numbers, characters, or snapshots &#128248;</strong> from the world around us, essentially the building blocks that lack inherent meaning on their own. For example, a sequence of numbers might seem like random gibberish until it&#8217;s processed and given context.</p><p>So, why do we sometimes talk about data and information as if they're one and the same? It's partly because the distinction can seem a bit academic when we're casually discussing how businesses or technologies use "data" to improve or "inform" decisions. In practice, the line between the two blurs as we process and analyse data to extract value from it, turning it into information seamlessly as part of our analytical protocols.</p><p>In essence, while data and information serve different roles in the cycle of understanding and decision-making, their close relationship in the process of analysis and interpretation often leads to the two terms being used interchangeably.</p><p>Remember, though&#8212;appreciating the journey from data to information is key to recognising the value hidden in the vast cyber seas we navigate daily.</p><p></p><p><strong>What do we mean by &#8216;Information&#8217;?</strong></p><p>So we take this data, sift it, knead it, and finally bake it within the oven of our processing methodologies, and it transforms it into information. This information, much like our loaf of bread, is palatable, useful, and ready to be consumed to satisfy our hunger for knowledge. It's the analysis, structuring, and contextualisation of data that gives it the significance we hope for, turning raw figures into insights on trends, behaviours, or operational metrics that inform decisions.</p><p>A commonly referenced example of information is &#8216;Personally identifiable information&#8217; or PII, for short. This is any information that can identify an individual. <strong>National Institute of Standards and Technology (NIST)</strong> <strong>Special Publication (SP) 800-122</strong> provides a more formal definition:</p><div class="pullquote"><p><em>Any information about an individual maintained by an agency, including</em></p><p><em>(1) any information that can be used to distinguish or trace an individual&#8217;s identity, such as <strong>name, social security number, date and place of birth, mother&#8217;s maiden name, or biometric records;</strong> and</em></p><p><em>(2) any other information that is linked or linkable to an individual, such as <strong>medical, educational, financial, and employment information.</strong></em></p></div><p><strong>Woah</strong>, so you can see that something as innocuous as <em>your name</em> is considered PII, which companies have a key responsibility to protect! </p><p>&#8220;Hmm, but how effective are they at doing this?&#8221; I hear you cynically mutter&#8230; Well, I&#8217;ll let you be the judge of that.</p><p>Diving a bit deeper, let&#8217;s talk about proprietary information. This is the secret sauce or the unique recipe that organisations guard with their very life&#8217;s blood. It's the magic formula, like Coca-Cola's "Merchandise 7X" &#129347;&#128203; or KFC's blend of 11 herbs and spices &#128020;&#128203;. These aren&#8217;t just random concoctions but carefully curated secrets that provide these companies with their competitive edge. Just as these recipes are only ever known by a few employees at any given time and kept away from prying eyes, so too must all organisations protect their proprietary information&#8212;be it software codes, technical blueprints, or business methodologies&#8212;from the purview of their competitors.</p><p><strong>NB:</strong> For the avoidance of doubt, when I refer to <em>data</em> I&#8217;ll be effectively referring to <em>information</em> as well.</p><p></p><p><strong>What do we mean by &#8216;Assets&#8217;?</strong></p><p>When we talk about 'assets', we're really just talking about all the things a company wants to keep safe. This includes everything you can touch, like computers and servers and even the stuff you can't, like the masses of data they have stored. </p><div class="pullquote"><p><em>Data is to a library's books as Hardware is to the library's shelves.</em></p></div><p></p><p><strong>IDENTIFYING YOUR ASSETS</strong> is the preliminary task we must do before we get anywhere.<br><br>Now, there&#8217;s something called the data lifecycle &#128260;, which describes the journey of data from its initial collection to its eventual destruction. It involves six key phases: acquisition (collecting data), storage (keeping it securely), use (utilising the data), sharing (distributing it appropriately), archival (storing it long-term for future reference), and destruction (safely disposing of data when it's no longer needed). This is the journey data takes we must protect it from the cradle to the grave.</p><p>One of the first steps in the lifecycle we must consider is to identify and classify our information and assets.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DGN0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DGN0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DGN0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a45a972d-be13-4a2e-9159-736701b6d42e_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:547169,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DGN0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!DGN0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa45a972d-be13-4a2e-9159-736701b6d42e_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Within a company&#8217;s security policy, an organisation will often guide us on how to <strong>classify</strong> different types of data, which we&#8217;ll come to in a moment; hang tight &#128018;. But what <em>is</em> the stance on the data itself? Should we pinpoint and monitor all of it as rigorously as we do our physical assets? </p><p>Well, it's not a straightforward yes or no. Many organisations possess data so vital that its loss, corruption, or exposure could spell disaster. Picture a healthcare provider's patient records going awry. The repercussions of such incidents could be dire, plunging the entity into turmoil. To avoid such scenarios from happening, exhaustive efforts are made to pinpoint and keep tabs on this critical data, often resulting in embedding metadata (virtual sticky notes containing key details) within files or records for easier tracking&#8212;we&#8217;ll worry about that one at a later time. Just comprehend the high-level concept for now.</p><p></p><p><strong>DATA CLASSIFICATIONS</strong> are simply ways to organise data based on its criticality or sensitivity. They may also be referred to as ASSET CLASSIFICATIONS, which, in reality, is the more all-encompassing term. We tend to use the former because, for most companies in the 21st century, their most prized possessions are not the computers and hardware they use to facilitate business but the data that is viewed and accessed by them.</p><p>With that in mind, if a confidential document resides on the CEO&#8217;s laptop, then that device (including its hard drive, should it be taken out) merits enhanced protection. Generally, the security level assigned to an asset (such as a laptop or a removable drive) holding or working with data should match the highest value of data contained within it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b3g3!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b3g3!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b3g3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f94b7964-e310-42a2-9407-1841be7b9afd_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:662627,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!b3g3!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!b3g3!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff94b7964-e310-42a2-9407-1841be7b9afd_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>For example, in a private company where an asset contains information ranging from public to sensitive and confidential, it should be tagged with the most secure classification and safeguarded appropriately&#8230; Comprendo? Bueno! &#129671;</p><p>In the digital world, information is like the lifeblood of any organisation, pumping through its veins and keeping it alive. However, not all information is created equal. It's often sorted into categories depending on how sensitive or critical it is. Think of sensitivity as how much of a storm would brew if certain pieces of information ended up in the wrong hands&#8212;that's the kind of hot water organisations like Equifax, Sina Weibo, and Marriott International found themselves in when their sensitive data was splashed across the headlines.</p><p>On the flip side, we've got criticality. This is about figuring out which pieces of information are the pillars holding up the organisation. If these were to vanish or get tampered with, it's like pulling the rug from under the organisation's feet. If sensitivity is hot water, criticality is boiling water. &#128166;</p><p>A stark example is Code Spaces, which had to shut its doors for good back in 2014. Why? Because critical data it depended on got wiped out in a cyber-attack. Without this data, it was game over. So, as we continue to traverse the connected highways of cybersecurity, understanding the difference between sensitive and critical information not only helps guard against potential threats but also ensures the lights stay on. </p><p></p><p><strong>CLASSIFICATIONS DEFINED</strong> in companies are typically dependent on whether we&#8217;re talking about a Private Entity or a Public Entity (i.e. Governmental Agencies).</p><p>For commercial or private companies, the common levels of sensitivity (with examples) from the highest to the lowest are as follows:</p><ul><li><p><strong>Confidential</strong>&#8212;Merger and acquisition plans: This is business-critical, and leaks could jeopardise competitive advantage.</p></li><li><p><strong>Private</strong>&#8212;Employee personal information: This includes information like your phone number, home address, or email that you might not necessarily want publicly listed.</p></li><li><p><strong>Sensitive</strong>&#8212;Proprietary software code: This could be the cornerstone of a company's new (non-flagship) product.</p></li><li><p><strong>Public</strong>&#8212;Annual reports: Often published on a company's website for investor transparency.</p></li></ul><p>For governmental entities such as the UK Ministry of Defence&#127894;&#65039;, sensitivity levels are categorised as:</p><ul><li><p><strong>Top Secret</strong>&#8212;This involves information that, if disclosed, could cause exceptionally grave damage to national security, such as nuclear weapon launch codes. The UK's Developed Vetting (DV) is the highest level of security clearance, and for good reason. Unsurprisingly, individuals with DV clearance often need to operate with minimal oversight, which explains the need for such stringent checks.</p></li><li><p><strong>Secret</strong>&#8212;Details of military technologies in development could give adversaries an unfair advantage.</p></li><li><p><strong>Confidential</strong>&#8212;Personnel records of soldiers while less critical than undercover identities, they still need protection.</p></li><li><p><strong>Controlled Unclassified Information</strong>&#8212;Non-sensitive logistical plans are things like supply chain management.</p></li><li><p><strong>Unclassified</strong>&#8212;Recruitment materials designed to attract new enlistees.</p></li></ul><p>The maestros behind these data classifications are the <strong>data owners</strong>, who decide on the appropriate classification level based on the data&#8217;s value and sensitivity. Meanwhile, the <strong>data custodians</strong> play the crucial role of maintaining the data and its assigned security level, ensuring the data's integrity, confidentiality, and availability are preserved as per the owners' directives.</p><p></p><h3>Conclusion</h3><p>I wasn&#8217;t entirely honest earlier. I said the UK&#8217;s DV is the highest level of security clearance in the nation, but that&#8217;s not technically correct. There is a level of clearance above that which only a very small number of people hold, and that&#8217;s enhanced-Developed Vetting (eDV). I can only imagine what kind of lives they live. Anyway, I digress.</p><p>Security is often a very costly expense, and data identification and its subsequent classification help us direct our efforts to where they matter most. So, if time and funds are going to be wasted, it won&#8217;t be on our watch!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CyberSimplified! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Security Digest - 03/05/2024]]></title><description><![CDATA[Your weekly dose of cyber awareness.]]></description><link>https://www.cybrsimplified.com/p/the-security-digest-03052024</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/the-security-digest-03052024</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Fri, 03 May 2024 06:01:05 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2LCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This week in Cybersecurity&#8230; &#128478;&#65039;</p><div><hr></div><h4><strong>Privacy Failures Endanger People Living with HIV: Urgent Action Needed Amid Persistent Data Breaches</strong></h4><p>The UK Information Commissioner John Edwards has highlighted ongoing significant privacy failures within health services that handle HIV-related data, putting patients' confidentiality at risk. Repeated data breaches have exposed the HIV statuses of individuals, undermining trust and subjecting them to stigma and discrimination. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2LCx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2LCx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 424w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 848w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 1272w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2LCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png" width="438" height="257.69" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c300756e-588d-465c-86f2-31179781b82b_1200x706.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:706,&quot;width&quot;:1200,&quot;resizeWidth&quot;:438,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Information Commissioner's Office - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Information Commissioner's Office - Wikipedia" title="Information Commissioner's Office - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!2LCx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 424w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 848w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 1272w, https://substackcdn.com/image/fetch/$s_!2LCx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc300756e-588d-465c-86f2-31179781b82b_1200x706.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Despite advancements in HIV treatment and support, the lack of privacy protection remains a grave concern. The ICO has demanded immediate improvements and better compliance with data protection laws across health services. Further, the ICO is working with HIV charities to enhance the guidance on handling sensitive information and ensuring victims of data breaches have access to remedial measures.</p><p><strong><a href="https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2024/04/information-commissioner-persistent-sensitive-information-breaches-failing-people-living-with-hiv/">READ MORE</a></strong></p><div><hr></div><h4><strong>Nationwide Shutdown: London Drugs Closes All Stores Following Major Cyberattack</strong></h4><p>After a cyberattack disrupted operations over the weekend, Vancouver-based retailer London Drugs has indefinitely closed all of its 79 stores across Canada. This proactive measure aims to secure customer and employee data and prevent further damage. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!y1g9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!y1g9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!y1g9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg" width="1280" height="853" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;London Drugs stores remain closed after 'cybersecurity incident' | CBC News&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="London Drugs stores remain closed after 'cybersecurity incident' | CBC News" title="London Drugs stores remain closed after 'cybersecurity incident' | CBC News" srcset="https://substackcdn.com/image/fetch/$s_!y1g9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!y1g9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F018ca42d-c932-41c6-9f4e-97a1ca360e42_1280x853.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The attack has halted both physical store operations and e-commerce sales, although pharmacists remain available for urgent needs. This incident underscores a broader trend of rising cyberattacks on Canadian businesses, highlighting the vulnerability of retail operations to such threats.</p><p><strong><a href="https://www.theglobeandmail.com/business/article-london-drugs-closes-all-of-its-stores-after-cyberattack/">READ MORE</a></strong></p><div><hr></div><h4><strong>Over a Million Australians at Risk as ClubsNSW Suffers Major Data Breach</strong></h4><p>A significant data breach at ClubsNSW has potentially exposed the personal details of over a million Australians, increasing their risk of identity theft. The breach, involving a third-party IT provider, affected less than 20 clubs but compromised sensitive information like driver&#8217;s license details and contact information, which may have been shared internationally. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EbG1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EbG1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EbG1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg" width="650" height="366" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:366,&quot;width&quot;:650,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A data breach has affected ClubsNSW.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A data breach has affected ClubsNSW." title="A data breach has affected ClubsNSW." srcset="https://substackcdn.com/image/fetch/$s_!EbG1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EbG1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93e6fcbd-7521-4f2c-86ff-381523849641_650x366.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>ClubsNSW is working with affected venues and authorities to manage the situation, while individuals are advised to remain vigilant against potential phishing attempts stemming from the breach.</p><p><strong><a href="https://7news.com.au/sunrise/a-million-aussies-at-risk-of-identity-theft-as-clubsnsw-data-breach-exposes-personal-details-c-14516263">READ MORE</a></strong></p><div><hr></div><h4><strong>Global Security Compromised: Cybercriminals Threaten Leak from Massive KYC Database</strong></h4><p>Cybercriminals have stolen and threatened to release data from the World-Check database, which contains sensitive information about individuals deemed high-risk for activities like terrorism and money laundering. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JV8I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JV8I!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JV8I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg" width="1456" height="658" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:658,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;World-Check logo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="World-Check logo" title="World-Check logo" srcset="https://substackcdn.com/image/fetch/$s_!JV8I!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 424w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 848w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!JV8I!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F54e6e8e1-a2f1-4b63-94bc-200a0c0e5bb8_1500x678.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The breach, confirmed by the London Stock Exchange Group, occurred through a third-party vendor. The database serves as a critical resource for financial institutions performing Know Your Customer checks and contains over five million records. This breach raises significant concerns about privacy, security, and the potential misuse of the exposed data.</p><p><strong><a href="https://www.theregister.com/2024/04/19/cybercriminals_threaten_to_leak_all/">READ MORE</a></strong></p><div><hr></div><h4><strong>Massive Data Breach at FBCS Exposes Personal Information of Nearly 2 Million Consumers</strong></h4><p>Financial Business and Consumer Solutions (FBCS) reported a significant data breach initiated on February 14, 2024, affecting around 1.955 million people. North Korean hackers are suspected of accessing sensitive data, including full names, Social Security numbers, and driver&#8217;s license numbers. </p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Nv-e!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Nv-e!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 424w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 848w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 1272w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Nv-e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png" width="412" height="162.6315789473684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:105,&quot;width&quot;:266,&quot;resizeWidth&quot;:412,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;FBCS, Inc. Logo&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="FBCS, Inc. Logo" title="FBCS, Inc. Logo" srcset="https://substackcdn.com/image/fetch/$s_!Nv-e!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 424w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 848w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 1272w, https://substackcdn.com/image/fetch/$s_!Nv-e!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8d25395a-f0aa-42e0-a4e6-5ad504c5675a_266x105.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>The breach was contained by February 26 after FBCS detected unauthorised network access. Measures were taken to secure the network and mitigate potential misuse, with ongoing investigations and strengthened security protocols. FBCS has also notified federal law enforcement and affected individuals about the breach.</p><p><strong><a href="https://www.techtimes.com/articles/304117/20240430/debt-collection-agency-fbcs-suffers-data-breach-affecting-1-9-million.htm">READ MORE</a></strong></p><div><hr></div><h4><strong>Potter Handy Law Firm to Represent Thousands in 23andMe Genetic Data Breach Case</strong></h4><p>Potter Handy LLP is representing nearly 5,000 clients in a lawsuit against 23andMe following a significant data breach that compromised the sensitive information of about seven million users. The stolen data, which includes genetic and personal details, was reportedly sold on the dark web.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0vY5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0vY5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 424w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 848w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 1272w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0vY5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png" width="560" height="330.4" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ac661dfa-27e5-490c-9438-93be3c863405_1200x708.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:708,&quot;width&quot;:1200,&quot;resizeWidth&quot;:560,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;23andMe - Wikipedia&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="23andMe - Wikipedia" title="23andMe - Wikipedia" srcset="https://substackcdn.com/image/fetch/$s_!0vY5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 424w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 848w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 1272w, https://substackcdn.com/image/fetch/$s_!0vY5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fac661dfa-27e5-490c-9438-93be3c863405_1200x708.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The law firm accuses 23andMe of negligence in safeguarding user data and failing to meet reasonable cybersecurity standards, thereby violating consumer privacy rights and exposing clients to potential identity theft and discrimination. Impacted individuals are primarily from California and Illinois.</p><p><strong><a href="https://www.businesswire.com/news/home/20240430220871/en/Potter-Handy-Law-Firm-Represents-Nearly-5000-Clients-in-23andMe-Data-Breach-Case">READ MORE</a></strong></p><div><hr></div><h4><strong>Change Healthcare Faces Massive Ransomware Attack Due to Security Lapses</strong></h4><p>Change Healthcare was hit by a ransomware attack executed by the BlackCat gang using stolen Citrix account credentials that lacked multi-factor authentication (MFA).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gw5j!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gw5j!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gw5j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg" width="840" height="438" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:438,&quot;width&quot;:840,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;New Ransomware Actor Threatens Change Healthcare&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="New Ransomware Actor Threatens Change Healthcare" title="New Ransomware Actor Threatens Change Healthcare" srcset="https://substackcdn.com/image/fetch/$s_!gw5j!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gw5j!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff9611cee-bf2f-4af4-b2b8-d709f6bf38a8_840x438.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Initiated on February 12, 2024, the breach allowed unauthorised access for about ten days, enabling data theft and system encryption that caused significant operational disruptions and a financial impact estimated at $872 million. The breach highlighted critical security failures and triggered a comprehensive response, including massive system overhauls and increased security measures to prevent future incidents.</p><p><strong><a href="https://www.bleepingcomputer.com/news/security/change-healthcare-hacked-using-stolen-citrix-account-with-no-mfa/">READ MORE</a></strong></p><div><hr></div><h4><strong>Finnish Hacker Sentenced for Blackmailing Therapy Patients in Massive Data Breach</strong></h4><p>Aleksanteri Kivim&#228;ki, a Finnish hacker, has been sentenced to six years and three months in prison for hacking into a psychotherapy centre's records and blackmailing patients. Kivim&#228;ki accessed the records of Vastaamo, a therapy centre affecting about 33,000 clients. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="6024" height="4024" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:4024,&quot;width&quot;:6024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;man siting facing laptop&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="man siting facing laptop" title="man siting facing laptop" srcset="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw0fHxoYWNrZXJ8ZW58MHx8fHwxNzE0NjE4NjI3fDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>He initially demanded a ransom from Vastaamo and then from the patients directly, leading to widespread outrage in Finland. This case marks a significant breach of privacy and security, highlighting the severe consequences of cyberattacks on personal data.</p><p><strong><a href="https://www.foxnews.com/world/finnish-hacker-sentenced-blackmailing-therapy-patients-accessing-thousands-records">READ MORE</a></strong></p><div><hr></div><h4><strong>FCC Levies Hefty Fines on U.S. Carriers for Unauthorized Location Data Sales</strong></h4><p>The FCC has fined major U.S. wireless carriers, including AT&amp;T, Sprint, T-Mobile, and Verizon, a total of nearly $200 million for illegally selling access to customer location data. This action concludes an extensive four-year investigation triggered by Senator Ron Wyden's inquiries. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5zLN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5zLN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5zLN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg" width="940" height="529" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:529,&quot;width&quot;:940,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Verizon vs AT&amp;T, T-Mobile and Sprint subscriber and profit margin charts  paint it red - PhoneArena&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Verizon vs AT&amp;T, T-Mobile and Sprint subscriber and profit margin charts  paint it red - PhoneArena" title="Verizon vs AT&amp;T, T-Mobile and Sprint subscriber and profit margin charts  paint it red - PhoneArena" srcset="https://substackcdn.com/image/fetch/$s_!5zLN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 424w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 848w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!5zLN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9d9ae61c-1873-41db-b920-83401402b51f_940x529.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The carriers, which had passed the responsibility of obtaining customer consent to third parties, continued their practices even after acknowledgements of security flaws, leading to widespread unauthorised data access and potential privacy invasions.</p><p><strong><a href="https://krebsonsecurity.com/2024/04/fcc-fines-major-u-s-wireless-carriers-for-selling-customer-location-data/">READ MORE</a></strong></p><div><hr></div><h4><strong>Marriott Admits to Misrepresenting Encryption Standards in 2018 Data Breach Case</strong></h4><p>In a recent court hearing, Marriott International confessed that it had misrepresented using AES-128 encryption to protect customer data during the 2018 breach, which actually used the less secure SHA-1 hashing method. </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XRRO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XRRO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XRRO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Wichita Marriott Hotel&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Wichita Marriott Hotel" title="Wichita Marriott Hotel" srcset="https://substackcdn.com/image/fetch/$s_!XRRO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 424w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 848w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!XRRO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd2c05133-7b9b-4b76-aa50-0a465893de1f_2880x1920.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This revelation came after a forensic investigation contradicted Marriott's long-standing claims. The misuse of SHA-1, which is prone to quick decryption, may have allowed hackers easier access to sensitive customer data. The disclosure has raised serious legal and security ramifications, potentially affecting ongoing lawsuits and Marriott's obligations under data protection regulations.</p><p><strong><a href="https://www.csoonline.com/article/2096365/marriott-admits-it-falsely-claimed-for-five-years-it-was-using-encryption-during-2018-breach.html">READ MORE</a></strong></p><div><hr></div><p><em>Enjoyed this week&#8217;s digest? Why not share it with a friend? Let these topical events lead your security conversations, and become the expert. Oh, and don&#8217;t forget to subscribe :)</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybrsimplified.com/subscribe?"><span>Subscribe now</span></a></p>]]></content:encoded></item><item><title><![CDATA[🔥🎬 - Communicating Security]]></title><description><![CDATA[Hot Take #1]]></description><link>https://www.cybrsimplified.com/p/communicating-security</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/communicating-security</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Wed, 01 May 2024 06:01:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/a2809b5c-5b7b-42a7-bee6-0e87fb684602_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>"As a security professional, it's like being a voice in the wilderness; I struggle to paint the picture for upper management that robust security is not a roadblock but the very guardrails that keep our corporate journey safe. Convincing them often feels like selling lifeboats on a ship that hasn&#8217;t seen a storm&#8212;necessary, yet undervalued until the waves hit." - Anon</em></p><div><hr></div><p><strong>Thoughts&#8230; &#128173;*</strong></p><p>Sadly, this isn&#8217;t an uncommon scenario in the industry. </p><p>So how do we solve it?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QUqt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QUqt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 424w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 848w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 1272w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QUqt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png" width="1456" height="922" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:922,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QUqt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 424w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 848w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 1272w, https://substackcdn.com/image/fetch/$s_!QUqt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffdd49b58-f83d-47a2-b00b-0420529eedd1_2160x1368.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>My approach is always to break this communication flow over two meetings with senior management where possible:</p><ol><li><p><strong>Sensibility</strong> <strong>&#8594;</strong> Before I even start thinking about explaining the security problems within the organisation, I would first make every effort to understand senior management's cognitive and emotional position regarding security.</p><p><br>As you&#8217;ve probably heard before, &#8216;Companies do not hire people; people hire people,&#8217; and management&#8217;s attitude towards security carries the same sentiment. We&#8217;re dealing with individuals, not faceless entities.</p><p><br>Ideally, I&#8217;m trying to build rapport and trust over coffee, an informal chat, a ride to the office, lunchtime, or whatever the medium. I do that by asking genuine questions seemingly unrelated to the business, although the answers will doubtless reference it; an ingenious way of doing this is to start high and stay on that path for a series of three or four questions in a friendly, inquisitive manner before organically moving onto another line of questioning, when appropriate.</p><p><br>For example, what are some of the ways you typically manage stress? &#8594; how would you grade yourself on doing &#8216;x&#8217; effectively? &#8594; what&#8217;s getting in your way of improving on &#8216;x&#8217;? &#8594; would you say that&#8217;s your biggest stressor, or is there another?<br><br>The above could go on for hours; get to the crux of the issue quickly and move on. Oh, and read the room.</p><p><br><strong>Note:</strong> <strong>You&#8217;re not asking for the sake of it. Focus on what&#8217;s being said; it&#8217;ll be invaluable later.</strong><br></p></li><li><p><strong>Hypothesis</strong> <strong>&#8594;</strong> Once I&#8217;ve built a reasonably strong rapport for the time with this executive, I&#8217;ll switch gears towards risk by coaxing them to think about what its significance is to them.</p><p><br>Here, I&#8217;m trying to find out how a sudden downturn in business would impact their personal lives. Is it something they really care about? Perhaps they are involved in other ventures, which makes the current business less integral to their affairs.<br><br>Usually, the man or woman opposite me will care a great deal about ensuring things go smoothly and will be severely impacted in some way by a business meltdown.</p></li></ol><p>I&#8217;d make a mental note of how the discussion went and ruminate on it as I start planning a slightly more formal setting for the follow-up rendezvous.</p><ol start="3"><li><p><strong>Case Study</strong> <strong>&#8594;</strong> This will take a little work, but it could be well worth it in the end. Researching and presenting a case study or two of a security breach in a similar organisation in the industry adds colour to the picture.</p><p><br>Going into the how, why, and the impact it caused is a visceral way to convey the need for adequate security. The most important thing here is to characterise the whole case study presentation with the knowledge acquired in the previous sensibility and hypothesis phase during our first informal meeting.<br><br>The closer I can get to &#8220;your-fears-were-realised-in-a-company-similar-to-us&#8221;, the better.<br></p></li><li><p><strong>Application &#8594;</strong> Finally, this is where one can shine. Providing you&#8217;ve done the work in working through your company&#8217;s vulnerabilities, this should be a cakewalk.</p><p><br>Naturally, the application stage builds upon all the previous information and shows why we are not in a firm position regarding the security of our company&#8217;s assets. Until this point, everything has been somewhat notional&#8212;things suggestive but not imminently existing in our reality.</p><p><br>That all changes with application, for which you&#8217;d hope the executive in question will be paying extremely close attention at this point.<br></p></li></ol><p>Is this a foolproof method to change senior management's minds in your good-natured security endeavours? Absolutely not, but it could be a giant leap in the right direction if you can execute it well. </p><p>CEOs, for example, have 101 things they&#8217;ll be dealing with at any given time. It takes sincerity, empathy and exceptional communication skills to influence decisions at this level. The people advising senior management in various capacities are generally people they trust. As a competent security professional, you must make that exclusive list and become one of them.</p><p>What do you think?</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.cybrsimplified.com/subscribe?"><span>Subscribe now</span></a></p><h6><em>*Subject to change at any time</em></h6><p></p>]]></content:encoded></item><item><title><![CDATA[Unchanging Truths of Information Security]]></title><description><![CDATA[Stability amid Change.]]></description><link>https://www.cybrsimplified.com/p/unchanging-truths-of-information</link><guid isPermaLink="false">https://www.cybrsimplified.com/p/unchanging-truths-of-information</guid><dc:creator><![CDATA[Ola Ajanaku]]></dc:creator><pubDate>Mon, 29 Apr 2024 06:00:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3><strong>Screen Shadows &#128373;&#127996;&#8205;&#9794;&#65039;</strong></h3><blockquote><p><em>"In the grand scheme of cybersecurity, an intern and a leaked password are like a rogue mosquito at a picnic &#8211; small, annoying, and capable of ruining the whole day." - CS</em></p></blockquote><p><strong>Picture this:</strong> Back in early 2021, the cybersecurity world was set ablaze with the story of the SolarWinds breach&#8212;a real head-scratcher that hit the very heart of digital trust, compromising both confidentiality and integrity. </p><p>Hackers, with their digital toolbox, found an open window through SolarWinds' Orion software, all thanks to a password that might as well have been "open sesame." Yep, you guessed it: "solarwinds123." This password, created by a junior intern, can be brute-forced in seconds and somehow found its way onto the internet's vast bulletin board, GitHub, through a little slip-up. </p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CyberSimplified! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The fallout? Enormous. This tiny crack in the wall let intruders waltz right into the digital homes of some pretty significant players, including folks over at the U.S. government, rummaging through sensitive data as if it were a yard sale. It's a stark reminder of how something as simple as a password can have ripples far beyond its humble characters.</p><div><hr></div><h3>TL;DR &#8987;&#65039;</h3><p>Cybersecurity isn't just for tech experts; it's also about applying common sense, much like not leaving your house unlocked. Here's a quick rundown of its core principles:</p><ul><li><p><strong>Confidentiality</strong>: Keeping data locked away from those who shouldn't see it.</p></li><li><p><strong>Integrity</strong>: Making sure data stays accurate and unaltered.</p></li><li><p><strong>Availability</strong>: Ensuring data is there when you need it, without delays.</p></li><li><p><strong>Authenticity</strong>: Verifying data comes from its true source.</p></li><li><p><strong>Non-repudiation</strong>: Creating a digital trail that prevents denying actions online.</p></li></ul><p>These pillars are the foundation of staying safe in the digital realm, protecting everything from personal info to ensuring transactions are genuine. Understanding these basics is crucial for everyone in today's interconnected world.</p><div><hr></div><h3><strong>&#128680; Security Briefing &#128680;</strong></h3><p>Often, when people talk about how much they want to get into cybersecurity, or even when my contemporaries speak about cybersecurity concepts, more attention should be given to the fundamental principles that form the backbone of security. I&#8217;m still yet to meet someone in my part of the world who purposely opts to leave the main door of their home wide open just before they retire to bed for the night.</p><p>Why? Because inherently, they know better. Kids might act carelessly enough to do that, but (I hope) adults generally don't. They understand the basics of personal safety without needing to take a dedicated course on Safety Essentials 101. That&#8217;s because <strong>security, at its core, is a mindset,</strong> and this applies equally to the digital world. So, to move from a child&#8217;s approach to a more mature understanding of cybersecurity, these are the pillars we need to master:</p><ul><li><p><strong>Confidentiality</strong> - Keeping sensitive data under lock and key</p></li><li><p><strong>Integrity</strong> - Accurate and reliable data, no unauthorised tampering</p></li><li><p><strong>Availability</strong> - Information access without delays or disruptions</p></li><li><p><strong>Authenticity</strong> - Verifying your information comes from a genuine source</p></li><li><p><strong>Non-repudiation</strong> - Proof of actions that cannot be denied later</p></li></ul><p>Without further adieu&#8230;</p><p></p><h3>Pillars Decoded &#128104;&#127996;&#8205;&#128187;</h3><p><strong>CONFIDENTIALITY</strong> means protecting your data from prying eyes. We put systems in place to control who can access what, ensuring sensitive information stays secure. It's about allowing the right people in and keeping unauthorised individuals out. To this aim, you&#8217;re almost certain to come across (if not already) the following industry-related terms, which all serve our purpose of achieving information security &#128274;:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bgvN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bgvN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bgvN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:333557,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bgvN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!bgvN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5f003890-2de6-4841-adb0-1da707bd9f74_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Sensitivity</strong> gauges how distressing it would be if someone else glimpsed your data. Technically, it measures the potential for negative impact or harm due to unauthorised disclosure. Picture your private browser history as dirty laundry; clearly, not everyone needs to see it.</p><p><strong>Discretion</strong> affords you the power to dictate who sees what and when. Technically speaking, it involves implementing access controls based on need-to-know and least-privilege principles. It&#8217;s akin to deciding whom you would entrust with babysitting your children. You wouldn&#8217;t confer this responsibility to just anyone, and the same cautious principle applies to your sensitive information.</p><p>Moving on to <strong>Criticality</strong>, this term probes how essential the information is for maintaining life's smooth progression. It assesses the indispensability of a system, asset, or process and the potential repercussions if it were compromised. Consider the difference between losing your house keys and a pack of gum. Both scenarios suck, particularly when your breath is beefing, but one clearly presents a more significant problem than the other.</p><p><strong>Concealment</strong> is not too dissimilar to playing hide-and-seek with your data, except we&#8217;re not playing here. Through techniques like encryption and obfuscation, it&#8217;s about making data difficult for unauthorised individuals to uncover. Picture stashing your valuables in a secret drawer instead of simply sliding them under your pillow.</p><p>To use a common catchphrase, the concept of <strong>Secrecy</strong> can be illustrated as "What happens in Vegas stays in Vegas," but applied to your data. It&#8217;s about preserving confidentiality through stringent access controls and safeguards. Imagine if the plot of the next Marvel movie were leaked before its release; spoilers aren&#8217;t fun for anyone.</p><p><strong>Privacy</strong> emphasises personal boundaries; it&#8217;s about keeping what you wish close to your chest, shielded from view. This entails protecting personally identifiable information (PII) to avoid damaging an individual's reputation or safety. Imagine your private diary, littered with all its secrets, suddenly displayed on posters at every bus stop in town. Far from an ideal situation.</p><p><strong>Seclusion</strong> transports your data to a metaphorical deserted island, storing it in a highly restricted, segregated environment away from social contact insofar as possible. Similar to secrecy but with the added step of separation. It&#8217;s like securing your secret bank account documents in a safe and burying that safe in your garden. Mr Fox might be curious, but he won&#8217;t be getting his paws on your assets.</p><p>Lastly, <strong>Isolation</strong> involves keeping your data in a sort of &#8216;quarantine&#8217;, away from other environments or processes. By segmenting sensitive data from other systems, the goal is to minimise attack surfaces and prevent any cross-contamination. Ever experienced the nauseating feeling when you&#8217;ve discovered that you&#8217;ve forwarded an email to the wrong person? Isolation is the cybersecurity strategy that helps avert such awkward blunders.</p><p></p><p><strong>INTEGRITY</strong> means no random changes to your data and nothing misplaced. Your digital life is a giant jigsaw puzzle &#129513;. Every email, text message, photo, and online purchase is a unique piece. For the whole picture to make sense, you need all those pieces to be exactly as you left them. This is the essence of data integrity.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TCLa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TCLa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TCLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:417453,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TCLa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!TCLa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7364da86-2cfa-48eb-9125-9a35c6665592_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the cybersecurity world, integrity is about making sure the digital puzzle remains reliable and accurate. It's about putting safeguards in place to prevent a whole range of mishaps, which we can view from three broad perspectives:</p><ul><li><p><strong>Protection against unauthorised subjects making changes:</strong> Hackers love to tamper with data: changing prices in an online shop, tweaking medical records, or even messing with your smart home settings. Strong integrity measures act like a digital bouncer, keeping these bad actors out.</p></li><li><p><strong>Protection against authorised subjects making unauthorised changes:</strong> We all make the occasional typo or accidentally delete important files. Integrity controls are your digital "undo" button, allowing you to roll back to the correct version or, more ideally, preventing them from happening in the first place.</p></li><li><p><strong>Maintaining the big picture:</strong> Integrity isn't just about individual files; it focuses on how everything fits together. If the balance in your online bank account is suddenly incorrect, it doesn't matter whether the transactions themselves are right. Integrity helps ensure all the pieces of your digital world align correctly.</p></li></ul><p>Unfortunately, upholding data integrity isn't easy. It requires a lot of work and robust access controls. It also involves constant checks to ensure data stays pristine as it moves between devices and online services where many cyber-criminals reside &#129399;&#127996;.</p><p>While the technical side might get a bit complex, the core concept is simple: in the digital world, just like in a jigsaw puzzle, you want every single piece to be perfecto!</p><p></p><p><strong>AVAILABILITY</strong> is a straightforward concept. If you&#8217;re reading this, I could bet my bottom dollar that on more than a dozen occasions in your life, you&#8217;ve tried to watch a video on a streaming service &#127871;, only to be greeted by that irritating buffering circle. That's the frustrating taste of an "availability" issue in the digital world. In cybersecurity, availability means making sure the stuff you need, when you need it, is actually there and working as you expect it.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UTdX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UTdX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UTdX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:491960,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UTdX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!UTdX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbb449a0-e4c6-4dc6-9d1f-32f054cd49c3_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But the cyber world, as we all know, isn't all sunshine and rainbows. Availability has its enemies:</p><ul><li><p><strong>Structural Issues:</strong> Hardware failures, software bugs, and power outages &#8211; these are the classic infrastructural components which love to cause us problems.</p></li><li><p><strong>Bad Actors:</strong> Hackers love launching Denial-of-Service (DoS) attacks, which basically flood your system with so much junk traffic that it grinds to a halt because it can&#8217;t process that junk quickly enough.</p></li><li><p><strong>Good Actors (albeit misinformed):</strong> Mistakes do happen! Accidental deletions, bad configurations, spilling coffee on the server...all classic availability downers due to human error.</p></li></ul><p>So, how do we keep things running as they should?</p><ul><li><p><strong>Redundancy is Key:</strong> You&#8217;ll be familiar with the term &#8216;backup,&#8217; but here, we mean something a little different. We&#8217;re talking about having spares so that if one system fails, another takes over immediately. Very nice.</p></li><li><p><strong>Cybersecurity Shields:</strong> Firewalls and access controls are like bodyguards, keeping malicious agents away from your precious resources. We&#8217;d rather not go without them.</p></li><li><p><strong>The Age-Old Backup: </strong>They're the ultimate "rewind button" in case something goes wrong. If we&#8217;re in charge of operations, it&#8217;s always a good idea to test them regularly&#8212;we don't want to find out they don't work when disaster strikes.</p></li></ul><p>Remember, availability is a big part of what makes the digital world truly useful. Companies spend a lot of time and money making sure their systems stay online reliably &#8211; because, let's be honest, an unavailable website or service is about as useful as a broken vending machine, and it will cost a company a whole lot more than a few missed kinder-bueno sales.</p><p></p><p><strong>AUTHENTICITY</strong> is what the spring chickens refer to as &#8220;being real&#8221;. No. Well, not quite.</p><p>Unlike integrity, authenticity is <em>proving</em> that the message you received was actually sent by the person or place it says it's from &#128519;. This means that when you get some piece of information, you can be pretty sure it's legitimate and hasn't been messed with along the way.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_q7_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_q7_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_q7_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:404550,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_q7_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!_q7_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbbcb9892-08d5-4628-adae-1f17f68535f0_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>How many examples have we personally come across in our daily lives? A spoofed email from your bank saying your account's been compromised?  A counterfeit handbag? Fake IDs? Watches? Emails? Knock-off websites? Take your pick!</p><p>Now, here's where things get interesting:</p><ul><li><p><strong>One-trick ponies aren't secure anymore:</strong> Relying on just a password is risky&#8212;hackers crack those all the time, especially when it&#8217;s as weak as our intern friend's earlier. That's why we use multi-factor authentication (MFA), such as having to input a text code received on your phone in addition to entering your password, or even better, a YubiKey. It might be annoying, but it&#8217;s better than having your accounts compromised.</p></li><li><p><strong>Context matters:</strong> Where you are and what device you use are extra clues to confirm that you're actually logging in, not a criminal halfway across the world trying to access your account after you just logged in from your home location 30 minutes ago&#8212;what we call in security &#8216;impossible travel&#8217;.</p></li></ul><p>Authentication is a complex topic we'll explore further later, but for now, remember that in the digital world, it&#8217;s not advisable to take things at face value. Make sure you&#8217;re dealing with a legitimate source before you hand over your personal information because once you do, you won&#8217;t get it back.</p><p></p><p><strong>NON-REPUDIATION</strong> sounds pretty intellectual, doesn&#8217;t it?</p><p>In the online world, words like "I didn't do it!" don't fly; that&#8217;s why people would rather exclaim, &#8220;I was hacked!&#8221;&#8212;hmm, yeah, convenient &#128173;&#129488;. That's where non-repudiation comes in. Think &#8216;digital receipt&#8217;, proving who sent what message, bought that embarrassing item, or triggered a security alert.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tUbC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tUbC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tUbC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png" width="600" height="600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:600,&quot;width&quot;:600,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:327026,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tUbC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 424w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 848w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 1272w, https://substackcdn.com/image/fetch/$s_!tUbC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c27e675-8044-4d64-b9e3-bc7c47e6ce9e_600x600.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here's why non-repudiation matters:</p><ul><li><p><strong>No Take-Backsies:</strong> If someone fakes your email to send nasty messages, you'd have a hard time proving it wasn't you without non-repudiation. You may well be in hot water for something a mischievous impersonator did.</p></li><li><p><strong>Take Accountability:</strong> From online shopping to file sharing at work, non-repudiation ensures everyone is responsible for their actions. No more blaming glitches.</p></li><li><p><strong>Detective Work Made Easy(ier):</strong> When something goes wrong, non-repudiation leaves us a trail of digital breadcrumbs to follow. This helps us figure out who accessed what and when, making investigations a lot more straightforward than if this trail wasn&#8217;t available.</p></li></ul><p>So, how do we make this non-repudiation magic happen?</p><ul><li><p><strong>Digital Signatures:</strong> At the moment, just think of these as fancy, impossible-to-fake electronic scribbles that prove it's really you.</p></li><li><p><strong>Logging the Details:</strong> Tracking who logs in, what they do, and when they&#8217;ve done it (as we kinda just said). It's the boring but essential audit trail that is logged and monitored by specialised software.</p></li><li><p><strong>Strong Access Controls:</strong> These controls ensure that only the right people can do the right things. They also minimise the chances of someone else using your account to cause trouble.</p></li></ul><p>Non-repudiation might seem like a techy, abstract concept, but it's arguably the cornerstone of trust online. Whether you're paying for a service online or accessing sensitive files at work, it's the system that helps make sure you (and only you) are responsible for your digital actions, so let&#8217;s behave shall we?</p><p></p><h3>Conclusion</h3><p>As you may have noticed, there are many overlapping concepts in cybersecurity, and it&#8217;s good they do because, as we discussed at the top of this post, <strong>security, at its core, is a mindset</strong>. Whether you&#8217;re a seasoned professional swashbuckling through the cybersecurity industry or a &#8216;regular degular&#8217; simply trying to ensure you&#8217;re not unnecessarily putting yourself at risk, there&#8217;s a healthy dose of professional scepticism needed to ensure we're keeping ourselves, families and organisations out of harm&#8217;s way.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.cybrsimplified.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading CyberSimplified! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>