Stories by Rick McElroy

Hackers increasingly ‘island hopping’ – so what does it mean?
Tue, 14th May 2019
#
cybersecurity
#
healthtech
#
hackers
Hackers are escalating their use of 'island hopping', targeting less secure third-party suppliers to infiltrate larger organisations' networks and wreak havoc.

Cyber attackers using businesses to target nation states
Tue, 4th Sep 2018
#
carbon black
#
nation state attacks
#
hyperconn
64% of incident response professionals had experienced attackers launching secondary command and control after an initial attack was shut down.

How to make attackers’ lives harder with effective threat hunting
Thu, 30th Nov 2017
#
siem
#
soc
#
carbon black
Sandboxing was big, but I believe that in two years sandboxing won’t be an effective control, because the bad guys understand it.

How Wi-Fi KRACK vulnerability can hit almost everyone with an endpoint
Wed, 25th Oct 2017
#
uc
#
telco
#
carbon black
We can be sure that attackers will leverage that delta in patching. Communication and router security has been ignored for too long.

What we can learn from the Google Docs hack
Fri, 12th May 2017
#
malware
#
phishing
#
email security
Remember, don’t be embarrassed about falling victim. The more we talk about how these things happen the better we will be.

Strategy for cyber crime: own the routers, own the Internet
Mon, 10th Apr 2017
#
router
#
carbon black
#
security vulnerabilities
Mobile devices & smart TVs controlled by cyber criminals make scary headlines. There's something scarier – the possibility that routers can be owned.