Stories by Rick McElroy
Hackers increasingly ‘island hopping’ – so what does it mean?
Cyberattacks escalate as hackers exploit supply chains, urging firms for vigilance.
Cyber attackers using businesses to target nation states
64% of incident response professionals had experienced attackers launching secondary command and control after an initial attack was shut down.
How to make attackers’ lives harder with effective threat hunting
Sandboxing was big, but I believe that in two years sandboxing won’t be an effective control, because the bad guys understand it.
How Wi-Fi KRACK vulnerability can hit almost everyone with an endpoint
We can be sure that attackers will leverage that delta in patching. Communication and router security has been ignored for too long.
What we can learn from the Google Docs hack
Remember, don’t be embarrassed about falling victim. The more we talk about how these things happen the better we will be.
Strategy for cyber crime: own the routers, own the Internet
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.