How-to How to break into red teaming Avoid the two behaviors that make it harder to get into red teaming, and engage in five learning activities to support your path to red team.
How-to How to break into red teaming - Part 2 Avoid the two behaviors that make it harder to get into red teaming. In part 2 I cover five specific actions to take for learning how to red team.
How-to How to break into red teaming - Part 1 Avoid the two behaviors that make it harder to get into red teaming. In part 1, I cover how to properly understand red teaming.
Members only Cybersecurity WYSK: 03/10/2023 This Week: OGT: Ocean Treaty; 1. Norfolk Southern; 2. Ring Warrants; 3. Bar Breach; 4. DoD Pushback.
Members only Cybersecurity WYSK: 03/03/23 This Week: OGT: Drought Reduction; 1. BetterHealth Settlement; 2. Cyber Strategy; 3. SNAP Benefits; 4. Brain Images.
Members only WYSK WYSK: 09/23/22 This Week: OGT: Sea Turtles; 1. Amazon Drivers; 2. Augury Collection; 3. Fat Leonard; 4. Uber Hack.
WYSK WYSK: 07/22/22 This Week: OGT: Tiger Populations; 1. Amazon Medical; 2. January 6; 3. Cyberspace Reality; 4. Zuck/Sandberg Deposition
WYSK WYSK: 07/01/22 This Week: 0. One Good Thing; 1. Modern Babel; 2. EPA Ruling; 3. China Hack; 4. Squid Game
WYSK WYSK: 04/15/22 This Week: 1. Decisive Moment; 2. Un-mutable Mics; 3. Data Brokers; 4. ShotSpotter Alterations
WYSK WYSK: 02/11/22 This Week: 1. Cybersecurity Priorities; 2. Judicial Algorithms; 3. Nothing Sacred; 4. Koningshaven Bridge
Cybersecurity Open Source and Apple Pie Software security can be achieved through liability; companies must be responsible for software they choose to adopt.
Cybersecurity Critical Infrastructure Security A quick US Critical Infrastructure Security primer, largely based on a report from the Congressional Research Service. What is Critical Infrastructure Security, what regulations govern it, and how has it been done so far?
Cybersecurity Taking down 'the grid:' simple is strong A third viewpoint in OT security discussions: disrupting OT processes is technically complex, but there are easier ways to impact OT. Simple attacks are not the gravest threat to OT, but they are the most under-estimated threat to OT.
Hacking Hacking/Infosec Resources Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.
Cybersecurity Ransomware as Pain: heeding pain stimuli for survival Ransomware is currently providing a pain stimulus to our country; the US has an opportunity to take action to avoid larger impacts. If the US responds poorly to that stimulus, the outcome will be fatal.
Cybersecurity Ransomware Get-well plan The US Government should pursue five policies through legislation, investment, and action, to drive the right incentives for asset-owners to improve security.
Cybersecurity Regulation and Ransomware: Fix the *Right* Problem Any ransomware solutions dictated to industry that fail to primarily address the business side will be ineffective at best, and are most likely to be costly, ineffective, and burn political capital with industry and voters.
Hacking Wrapper Development for Mythic C2 This how-to walks through building a generic C# wrapper for Mythic C2 version 2.1