I started writing my infosec newsletter in 2018. It covers the security and privacy topics that caught my attention each week, some interesting numbers or stats, and a summary of the news headlines. I’m current in the process of porting across the back catalogue from the previous two volumes. They’ll appear here
over the coming weeks at some point.
I love to hear from readers and you’re very welcome to submit suggestions, feedback and tips.
Vol. 5, Iss. 20
Costa Rica declares state of emergency over ransomware incidents. Civil penalties proposed for Colonial Pipeline over safety breaches.
Vol. 5, Iss. 19
Mandiant identified stealthy APT actor targeting M&A teams in large corporates. Heroku mishandles breach of customer paswords, environment secrets. $1.6 billion of cryptocurrency has been stolen so far this year.
Vol. 5, Iss. 18
Conti ransomware gang targets Costa Rica following election. Timeline of Russian cyberatacks against Ukraine. Facebook doesn't know where your data flows.
Vol. 5, Iss. 17
Okta breach affected two customers. Russian invasion leaves it 'fair game' for cyberattacks. Java’s ‘psychic signatures’ and conceptualising cybercrimes.
Vol. 5, Iss. 16
Industroyer2: Cyberattack on Ukraine power grid averted. $600 million crypto-heist linked to North Korea's Lazarus group. RaidForums seized by UA authorities.
Vol. 5, Iss. 15
Russian 'Cyclops Blink' botnet disrupted by the US. The value of Mailchimp distribution lists. Fundemental security metrics.
Vol. 5, Iss. 14
Okta says it made a mistake. Wiper malware used against Viasat modems during Russian invasion of Ukraine. DCMS' cyber survey stats.
Vol. 5, Iss. 13
The rise, and fall?, of Lapsus$ as Okta confirm breach. US CNI cyberattack warning. Build capabilities, not plans for resilience.
Vol. 5, Iss. 12
Russia/Ukraine roundup. Mysterious incident affecting satcom terminals. Ransomware group adds wiper capability. Law firm gets GDPR fine for not patching.
Vol. 5, Iss. 11
Conti's involvement in crypto 'rug pulls'. Unintended consequences of isolating Russia from the Internet.
Vol. 5, Iss. 10
The 'pandemonium' of modern warfare.
Vol. 5, Iss. 9
Russia invades Ukraine.
Vol. 5, Iss. 8
DDoS attacks on Ukraine MoD and banks. French signal jamming. New version of 27002 security control framework.
Vol. 5, Iss. 7
Slovenian TV disruption. 500 ecommerce sites compromised by MageCart. 2021 was a bumper year for cyber M&A.
Vol. 5, Iss. 6
News Corp targeted in 'advanced persistent' attack. US launches Cyber Safety Review Board. One guy knocks North Korea off the 'net.
Vol. 5, Iss. 5
Activists ransomware Belarus' state-woned railway company. New UK cyber strategy for government. Let's Encrypt re-issuing 2M certs.
Vol. 5, Iss. 4
UK government advertising campaign against E2EE. Merck win 'act of war' cyber insurance lawsuit. More Russian action against cyber crims.
Vol. 5, Iss. 3
Russian authorities scoop up members of REvil. Google Analytics and GDPR. Using a cyberattack to accelerate dgitial transformation.
Vol. 5, Iss. 2
Potential FTC legal action over Log4shell. Phishing using Google Docs. New UK Information Commissioner. Reframing cybersecurity.
Vol. 5, Iss. 1
What does 2022 hold for cyber and the world?
Vol. 4, Iss. 52
Join me on a look back through some of the biggest and most interesting infosec stories and 12 cyber stats that made 2021.
Vol. 4, Iss. 51
Over 100 VMware apps are affected by Log4j, as a second patch is released to address 'Log4Shell' vuln. £2.6B UK cyber strategy unveiled. Plus interesting results in long-term phishing study.
Vol. 4, Iss. 50
Huge AWS outage. Vulnerability in Log4j library affecting a lot of apps. Google Tag Manager being used in MageCart attacks.
Vol. 4, Iss. 49
Cyber Essentials changes coming very soon. The future of the infosec profession. DfT domain hosting porn.
Vol. 4, Iss. 48
Big penalties associated with UK's IoT security legislation. Tardigrade malware targeting biomanufacturing. Databreach of 1.2M GoDaddy customer details. Lloyd's insurance policy wording on cyber war.
Vol. 4, Iss. 47
Rowhammer returns. Intel chips vulnerable to physical debug attack. Tesla owners locked out. How a bank runs their PKI.
Vol. 4, Iss. 46
The balance of public/private responsibility for cyber security. FBI app sends spoof emails. Learning from how the aviation sector handles incidents.
Vol. 4, Iss. 45
Trojan source vulnerbaility in the way compilers handle Unicode characters. Meta/Facebook to disable facial recnogition feature and delete faceprints.
Vol. 4, Iss. 44
FCC revokes China Telecom license; Creating minimum viable secure products; ENISA threat landscape report.
Vol. 4, Iss. 43
US bans sales of offensive cyber tools to authoritarian governments. REvil taken offline in multi-national operation. The MoD's economic warefare unit.
Vol. 4, Iss. 42
White House ransomware summit attended by over 30 countries. Client-side scanning (such as for CSAM) may undermine democracy. Don't view-source on Missouri state websites
Vol. 4, Iss. 41
Facebook's outage; compromise at major telco supplier; Twitch's massive breach; NSO Group spyware used to spy on Princess' divorce.
Vol. 4, Iss. 40
Azure AD wasn't logging all failed SSO requests. Ransomware crew gets pissy. 'Monoculture' cyber risk.
Vol. 4, Iss. 39
'Releasing the hounds' on ranomware actors, though FBI involvement in Kaseya shows offnseive operations may already be underway.
Vol. 4, Iss. 38
Azure Linux VMs being compromised. OWASP Top 10 draft updates. Microsoft goes passwordless. Learning from other professions.
Vol. 4, Iss. 37
Encryption backdoors, the NSA and Juniper. Proton Mail got served. Wireless charging side-channel attacks.
Vol. 4, Iss. 36
Focus on proxyware, patch your confluence servers, the normalisation of surveillance, and interview with a ransomware negotiator.
Vol. 4, Iss. 35
Microsoft's $20BN investment is on its own products, and they need the investment. Future of the UK's 'post-Brexit' data protection regime and new Information Commissioner. Samsung can remotely disable its smart TVs.
Vol. 4, Iss. 34
T-Mobile suffers *another* data breach. Pearson settles over misleading investors. Outrage in cyber risk. Anyone can post a LinkedIn job as pretty much any company.
Vol. 4, Iss. 33
Apple's damage-control on CSAM. Belarus' state security doxxing. Code poisoning ML models.
Vol. 4, Iss. 32
Apple's plans to have iPhone continuously scan for child sexual abuse material are ripe for abuse.
Vol. 4, Iss. 31
Biden's 'real shooting war' comments. Amazon's €746M GDPR fine. Iran's fake social media profiles. Phantom flotillas.
Vol. 4, Iss. 30
China called out for state-sponsored cyber campaigns. NSO Group in the spotlight (again) for spyware. Questionable QA on Google Chrome OS update.
Vol. 4, Iss. 29
ICO raids two properties in Hancock CCTV investigation. Another Windows printer vuln. REvil's sites offline. Identity verification isn't the answer to online abuse.
Vol. 4, Iss. 28
More on Kaseya. The PrintNightmare continues. Farmers win 'right to repair' and Kaspersky's not-so-random number generator.
Vol. 4, Iss. 27
Kaseya VSA used to launch 'over 1,000' ransomware attacks. Security researchers cause PrintNightmare. EU grants UK data protection adequacy decision.
Vol. 4, Iss. 26
MITRE and NSA want to D3FEND your network. Aussie 'safety by design' toolkit. EU launches 'joint cyber unit' to coordinate 'nightmare' attacks.
Vol. 4, Iss. 25
Suspected Cl0p members arrested. Ransomware is an 'urgent' threat to U.K. Balancing cyber supply and demand. And, Dear Intern...
Vol. 4, Iss. 24
EA games source code stolen. Apple's news privacy and security features. The FBI ran An0m encrypted comms app. Ransomware thinking.
Vol. 4, Iss. 23
The U.S. continues beef with Russian ransomware gangs. Colonial Pipeline was result of compromised creds. FireEye to divest name, products business.
Vol. 4, Iss. 22
Flashcards reveal the location of U.S. nuclear weapons. Email security tools are working? And fingerprints from photo leads to arrest.
Vol. 4, Iss. 21
Lots of ransomware: Ireland's HSE will not pay. Colonial coughed up $4.4M'. But there are Technology Detection Dogs. And they're very good dogs!
Vol. 4, Iss. 20
All the stats: it's DBIR time. Colonial Pipeline paid ransom, restored service and DarkSide disappeared. Being better at security engagement.
Vol. 4, Iss. 19
Responsible cyber power. Colonial Pipline shut down due to ransomware. Injecting malware C2 into legitimate traffic. Authentication using a severed thumb.
Vol. 4, Iss. 18
Babuk ransomware operators demand $50M from DC police. BoJo's phone number available online. Emotet deactivated. And, burrowing beavers.
Vol. 4, Iss. 17
Ransomware in Apple's supply chain. Facebook seeks to 'normalise' scraping. The balkanisation of the Internet has intelligence agencies worried. Cellebrite's iPhone unlocking system is full of vulnerabilities.
Vol. 4, Iss. 16
FBI gets a warrant to fix Hafnium web shells, becomes an MSSP. Sanctions for Russia over SolarWinds. Plus you cheddar believe there are some cheese puns.
Vol. 4, Iss. 15
Facebook's *ahem* 'data scraping' incident sets the stage for debate on responsible design and engineering. AWS bomb threat. Censorship by QoS. TUI's algorithm gender bias led to 'serious incident' calculating takeoff loads.
Vol. 4, Iss. 14
The long-tail of ransomware recovery. PHP source code compromise. Exploiting 'safe' file formats. Risk margins and early risk management decisions.
Vol. 4, Iss. 13
FatFace IR comms 'confidential' while loosing 200GB data. Cyber insurer CNA may have been targeted for policy info. OSINT on the Ever Given.
Vol. 4, Iss. 12
Rerouting a victims SMS for $16. UK defence review: nuclear response for cyber attack. Who is buying all the data generated by your car?
Vol. 4, Iss. 11
Criminals jump on Hafnium/ProxyLogon. Hacktivists breach Verkada's 150K facial recognition cams. Apple's IP theft lawsuit. Google's Spectre exploit.
Vol. 4, Iss. 10
Hafnium mass-exploitation of Microsoft Exchange servers. Google, Alliaz and MunichRe team up on cloud cyber insurance. Bitflipping may be more common than you think.
Vol. 4, Iss. 9
IABs charge just $7,100 for access to victims networks. Accellion file transfer appliances popped left, right, centre. Former SolarWinds CEO says it is all the interns fault.
Vol. 4, Iss. 8
Microsoft source code stolen by Russia in Solorigate attack. France uncovers campaign targeting IT providers. SIEM & ATT&CK. And Citibank's $500M UI gaff.
Vol. 4, Iss. 7
Dependency confusion: all up in your package manager and automated build process. Florida water treatment plant compromised. Details of cyber-attacks on Isis. Bloomberg back again with The ~~Big~~ Long Hack.
Vol. 4, Iss. 6
SolarWinds caught up in second campaign against U.S. gov tied to China. Plus an interview with a ransomware operator and Canada declares Clearview AI is 'illegal'.
Vol. 4, Iss. 5
Law enforcement's Emotet takedown and NetWalker leak site seized. Got root? Sudo vuln will get you there. North Korea goes after security researchers for 0-day.
Vol. 4, Iss. 4
Malwarebytes compromised in Solorigate; German company fined for video surveillance of staff; Intel publish financial results early due to leaked info
Vol. 4, Iss. 3
Vol. 4, Iss. 2
Cyber implications of the Capitol insurrection. Solorigate 'likely' the work of Russia. SolarWinds hires Krebs Stamos Group. Microsoft throws some shade.
Vol. 4, Iss. 1
Microsoft source code accessed in Solorigate attack. Plus advice on buying and selling second-hand devices from NCSC. And how much does cybercrime cost Russia?
Vol. 3, Iss. 52
Strap in and get ready for a recap of the things that I think have been most _interesting_ rather than _highest profile_, in 2020.
Vol. 3, Iss. 51
SUNBURST attack on U.S. government is both huge, and nothing new. Google suffers multiple outages. Automated attacks on online banking.
Vol. 3, Iss. 50
FireEye breached by sophisticated actor; $1TN reportedly lost to cybercrime in 2020; Zodiac killer cipher cracker after 51 years.
Vol. 3, Iss. 49
TrickBot is recovering from CyberCom, Microsoft takedowns, gains UEFI/BIOS capabilities. 'Cold chain' of COVID-19 vaccine targeted. Zero-click exploit in Apple iPhone.
Vol. 3, Iss. 48
RCEP, cyber cooperation and Asian data sovereignty; UK National Cyber Force; Microsoft's 'Pluton' and US Special Forces buying location tracking data
Vol. 3, Iss. 47
RCEP, cyber cooperation and Asian data sovereignty; UK National Cyber Force; Microsoft's 'Pluton' and US Special Forces buying location tracking data
Vol. 3, Iss. 46
No, Apple aren't logging every app you run, but they are brining privacy nutrition labels to AppStore. Tim Berners-Lee's Inrupt launches Solid server. Ticketmaster to appeal £1.25M data breach penalty.
Vol. 3, Iss. 45
Nothing cyber happened in the US election. Corporate VOIP systems being targeted. Don't pay ransomware gangs to not leak your data.
Vol. 3, Iss. 44
Marriott's data breach penalty, how the Clean Network Program is changing 5G economics, reverse-engineering redaction and new ransom threat to health data. Plus company naming fun.
Vol. 3, Iss. 43
DOJ charges Fancy Bear, Doubts over Trump's Twitter password, and digital dilemmas for charity donations.
Vol. 3, Iss. 42
British Airways fined £20M for data breach; Businesses exploiting contact tracing data; Microsoft's trademark takedown of TrickBot.
Vol. 3, Iss. 41
Integrity in the UK Test & Trace scheme; ransomware attacks up 50%; a different type of lock-down.
Vol. 3, Iss. 40
US Treasury issues advisory over ransomware payments; Huawei code quality still really bad; and Singapore's consumer security labels.
Vol. 3, Iss. 39
YOLOsec, FOMOsec, business value and commodity controls. Plus a couple of examples of how hactivism is evolving.
Vol. 3, Iss. 38
Domain admin for EVERYONE! APT41/Winnti charged for cyber-espionage and activities against computer games companies. First death leading directly from cyber-attack :-(
Vol. 3, Iss. 37
China's Global Initiative on Data Security; Ireland's data regulator 'unlikes' Facebook; Who is top of the Cyber Power Index?
Vol. 3, Iss. 36
Benchmark data from Hiscox's Cyber Readiness Report 2020, MIT's SCRAM, US federal vulnerability disclosure policies, CEO responsibilities and Tesla's fleet-wide hack.
Vol. 3, Iss. 35
Attempted $1M bribe of Tesla employee in ransomware campaign. NZX trading suspended for four days due to DDOS. Supply and demand in security budgets.
Vol. 3, Iss. 34
Personal liability for CISOs in data breach cover-ups, 'fraudulent data requests' at Experian and mailto: attachment vulnerability.
Vol. 3, Iss. 33
Algorithms and accuracy in A-Level exame results. ReVoLTE over 4G misconfiguration. Vaccinating against Emotet.
Vol. 3, Iss. 32
Bits from Black Hat (satellites, bug bounties and manipulating energy markets), plus Liam Fox's emails and the march of time on seized devices.
Vol. 3, Iss. 31
Ransomware payments encourage more ransomware attacks. EU cyber sanctions. Three charged in Twitter crypto-scam.
Vol. 3, Iss. 30
Garmin 'ran somewhere.' UK Test & Trace doesn't have a DPIA. Emotet serving up Hackerman memes.
Vol. 3, Iss. 29
Schrems II, Huawei, and the battle for digital dominance. Plus the 'Great Twitter Hack,' and All. The. Vulnerabilities.
Vol. 3, Iss. 28
Hong Kong's new national security law causes headaches for citizens, tech and finance companies. Steal the cash, not the painting. Cosmic Lynx and Russian cyber-criminals' 'synergistic value accelerative opportunity'
Vol. 3, Iss. 27
Encrochat and evolving law enforcement tactics prove there is a different want to encryption backdoors. Explosion at Natanz doesn't mean 'Stuxnet 2.' And, don't host your website on Internet Archive.
Vol. 3, Iss. 26
Three years on from NotPetya. BlueLeaks and sector-specific aggregation of risk. Minimising harm in breach notification comms. Exfiltrating data using Google Analytics.
Vol. 3, Iss. 25
COVID-19 cyber threat update; IoT device vulnerabilities; how to spot like-farming!
Vol. 3, Iss. 24
Snowstorm in a Dark Basin: Citizen Lab, MDR Cyber shine light on hackers for hire. Babylon Health breach and lessons from Apple, Amazon, and Google. How far do you go to protect against cyber-harm on your platform?
Vol. 3, Iss. 23
REvil launch auction site, while Maze and LockBit team up to pool resources, know-how. Plus inside a BEC scam and DROP DATABASE tickets.
Vol. 3, Iss. 22
Cybercrime is boring; Capital One IR report isn't legally privileged; and easyJet target of £18Bn legal action.
Vol. 3, Iss. 21
The annual DBIR data-fest, looking in to EasyJet's breach, the importance of audit trails, and Trump's banking details
Vol. 3, Iss. 20
Pricing cyber risk from external data, attack on 'UK electricity system' and mining crypocurrency with supercomputers
Vol. 3, Iss. 19
Contact tracing apps, password reuse stats, law firm ransomware, and the integrity of systems
Vol. 3, Iss. 18
Mobile device management as a vector, turning antivirus against itself and ransomware's long game
Vol. 3, Iss. 17
Zero-click vulnerability in Apple's Mail app, surveillance and tracking COVID-19, UK MoD relaxes security requirements.
Vol. 3, Iss. 16
Compliance risk and the German state of North Rhine-Westphalia’s loss of €30M-€100M #COVID19 aid because of poor identity verification. Plus DoD and measuring meaningful things. And jumping air-gaps with computer fans.
Vol. 3, Iss. 15
Cyber-crime economics of Coronavirus; US Senate bans Zoom; China Telecom and BGP hijacks
Vol. 3, Iss. 1
California's Consumer Privacy Act; Travelex systems still offline; the rise of 'data exposures'.
Vol. 3, Iss. 2
Travelex's ongoing response; £500K penalty for DSG Retail; No patch for Citrix vulnerabilities until end of month.
Vol. 3, Iss. 3
Changing the economics of cybercrime; Windows crypto vulnerability; and rival groups exploiting Citrix.
Vol. 3, Iss. 4
Jeff Bezos' phone hacking; Microsoft's elastic search snafu; ClearView.AI and facial recognition tech.
Vol. 3, Iss. 5
Jumpshot reminds us security isn't privacy; whopping REvil ransom demands; and keep calm/cary on for DPOs.
Vol. 3, Iss. 6
Simon Weckert's Google Maps art installation; IKEA's data promise; and valentine's security awareness.
Vol. 3, Iss. 7
Huawei, Crypto AG, and all the nations doin' all the cybers; plus Emotet.
Vol. 3, Iss. 8
Georgia defacement attribution; misusing anti-abuse; Pipeline ransomware.
Vol. 3, Iss. 9
Security awareness without fear; Android malware stealing 2FA codes; click here to sue everybody.
Vol. 3, Iss. 10
Cashing in on loyalty points; scam certificate pages and the CIAs password
Vol. 3, Iss. 11
Future U.S. cyber strategy; Whisper not-so-secret; wormable Microsoft vulnerability in SMB
Vol. 3, Iss. 12
Government cyber advice, examples of phishing campaigns, and things you should patch in the times of COVID-19.
Vol. 3, Iss. 13
FBI COVID-19 scam warning; FIN7 mailing malware USB keys; predicting attacks from Russian APTs.
Vol. 3, Iss. 14
All the Zoom news distilled, plus Marriott data breach, Morrisons' supreme court win, cloud availability, bug bounty non-disclosures and COVID-19 CTI.