Uber, Rockstar fall to social engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Events like this month’s breaches have happened before and will happen again. The task for defenders not directly affected by the Uber and Rockstar attacks, writes Chester Wisniewski, is to learn by putting your own team into those companies’ shoes.

Read more

Uber, Rockstar fall to social-engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Security pros often talk of security being a process and a system, not a destination, and the recent news from Uber and Rockstar Games is just another example. Details are still emerging, but we can still analyze these breaches at a high level and apply these lessons to our own information security programs. Similar to […]

Read more

Six months on: Looking back at the role of cyberattacks in the Ukraine War

Credit to Author: Chester Wisniewski| Date: Wed, 14 Sep 2022 13:00:39 +0000

When Russia invaded Ukraine on February 24th 2022, none of us knew what role cyberattacks might play in a full-scale invasion. Russia had been conducting cyberattacks against Ukraine since it had occupied Crimea back in 2014 and it seemed inevitable that these tools would play a role, especially after the attacks on Ukraine’s power grid […]

Read more