You missed it! Threat Actors simple paths into your network.

On December 3rd, 2024, six cybersecurity organizations published Enhanced Visibility and Hardening Guidance for Communications Infrastructure, detailing simple paths threat actors use to penetrate networks. Most people I talk to say, “This is nothing new.” “We’ve heard it all before.” “These are all Best Common Practices (BCPs); everyone should have deployed them already!” Do not Read More

Using your Printer Ports to Attack?

Do you have a customer whose printer ports are open and vulnerable and can now be used for DDoS? Is your network’s “Internet Print Protocol” (IPP) port open and ready for exploitation? Last week, the Shadowserver Foundation alerted a “large increase in queries on 631/UDP seen in our sensors due to recent CUPS RCEs disclosure. Read More

Welcome to my LinkedIn Community!

We’re now connected on LinkedIn! We’re now part of a LinkedIn Community. Thank You.  My LinkedIn community specifically focuses on peer relationships with people I’ve worked with over time, peers in the cybersecurity community, and colleagues who have been expanding, building, and architecting the Internet. We only have 30,000 first-level connections. While those seem like

PlugX Infections – Is that You?

The French Government sees the massive number of PlugX infections as a national threat. PlugX is malware used by Nation State threat actors to get inside networks. Sekoia was part of a sinkholing action that uncovered thousands of locations where PlugX is deployed. Should you be concerned? How do you discover if you have a Read More

Industry Anti-DDOS Strategy 2018

Note to the Readers …… Yes, there are communities who consult and curate an anti-DDoS strategy to mitigate the risk to the Internet. Starting ~2000, Operators have consulted on ways to build better resilience into the Internet’s infrastructure. These consultations evolved into informal security strategy plans. By 2012, multiple groups were involved (see http://www.senki.org/2012-a-year-of-cyber-security-optimism/).  A Read More

Cyber Smokejumping

Cyber Smokejumping is a decades-old practice of intentionally investing time with peers to help them overcome cyber risk. Our global, massively interconnected Digital Society requires increased cybersecurity capabilities, capacity, habits, and practices spread worldwide. Putting up cyber walls and layers of defense will not help if other parts of the world are getting infected and

Leveraging Cyber Civil Defence

The cyber civil defence services provided by the Shadowserver Foundation are the most overlooked and critical tool for securing your network. If you are a cybersecurity professional and NOT signed up to Shadowserver, you are missing details that will protect your network from the next attack. If you want a quick introduction to Shadowserver, check Read More

Optimize Shadowserver’s Value – Checklist

Optimize Shadowserver’s value! Stop the Threat Actors! You are at risk if you get any of the +120 daily reports. Most issues are easily fixed. All these reports share details the threat actor can potentially exploit. Take 15 minutes once a quarter to update your contacts, ASNs, IPs, Domain, APIs, and other details. Quarterly Reviews Read More

My Birthday Wish is for you to be Cyber Safe

To all those who pinged me via social media, thank you for remembering me on my birthday. I hope the year will be prosperous, connecting, and loving for all. Some people ask what is my birthday wish. This year (like last year), Digital Safety “self-care” actions. These “self-care actions” will help protect you, your family, Read More