Skip to content
SENKI
Surfing Internet Security & Resiliency as we thrive, heal, and grow in this life ….
  • Practical Security Guides, References, & Workbooks
    • DDoS Resiliency & Attack Preparation Workbook
      • DDoS Resiliency Workshop – 2022
      • DDoS Extortionist’s Behaviors
      • Operator’s Security & Resiliency Toolkit
      • Expected DoS Attacks – 10 Steps to Prepare for the Pain
      • 7 Habits of Highly Effective Cyber-Criminals
      • BGP Route Hijack – What can be done Today?
      • Preparing for DOS Attacks – the Essentials
        • Remote Triggered Black Hole (RTBH) Filtering
        • Monitoring Your Network for Malware, SPAM, BOTNET, and other Infections
        • Study Materials for Operational Security and DOS Defense
          • US’s National Strategy to Secure Cyberspace (2003)
        • SLA as a Security Tool
        • Remediating Violated Customers
        • Open Source Threat Intelligence Feeds
      • The History of DDoS and DoS
    • Network Operations & Scaling
      • Operator’s Security Toolkit – Main Page
        • The Service Provider Security “Bootcamp”
          • June 2014 Workshop Slides
          • Indonesia SP Workshops
          • CommunicAsia 2015
          • APRICOT 2012 Network Security Workshop
          • June 2014 Workshop Slides
          • Telecoms Security Workshop 2012
          • MAAWG 2012 Security Workshop
      • ISP Workshop Program
        • ITU Africa Telecom 98 IXP Demonstration
        • Singapore Internet Backbone (SIB)
      • Public Cloud DNS Resolvers (which offer services)
      • DNS Latency and Performance Test Tools
      • Network Operations Groups (NOGs)
    • Vendor Security
      • Meaningful Security Conversations with your Vendors
      • IoT Security Standards & Frameworks
    • Filtering Exploitable Ports and Minimizing Risk from the Internet and from Your Customers
  • Empowerment
    • Effective Linkedin Connections – Building Your Network
    • Building and Investing in a Community of “Contacts”
    • Principles to invest in Linkedin for an Effective Impact
    • Social Media PODs for Security
    • Programs that Empower Women Engineers
    • Leveraging Credit Cards – Principles that Maximize Gain while Preventing Pain
  • About Senki
    • Conference Talks, Workshops, and Webinars
    • Stay Connected with Senki’s Updates
    • Barry’s BIO
      • What Drives Barry?
      • Influential Reading List
    • I’ve got an exciting opportunity for you ….
    • Posting on Senki

Tag: CISA

Thanksgiving Holiday Fun! Five Eyes Warn of LockBit 3.0 Ransomware!

Thanksgiving Holiday Fun! Five Eyes Warn of LockBit 3.0 Ransomware!

Posted on November 22, 2023November 22, 2023

Do you know if your network is vulnerable to LockBit 3.0 Ransomware crew getting into your network via NetScaler CVE-2023-4966 vulnerability? Boeing – a company with a powerful cybersecurity team – was penetrated by the LockBit crews using CVE-2023-4966. Is this your Thanksgiving holiday fun? For those subscribed to Shadowserver free Cyber Civil Defence reporting, Read More

Why are the top National Security Teams Yelling for you to Fix your Network?

Why are the top National Security Teams Yelling for you to Fix your Network?

Posted on August 3, 2023August 3, 2023

The top National Security Teams are yelling at you to fix your network. The Joint Advisory is not a simple act of collaboration. The first 12 are highlighted for a reason. We do not know the insider reasons other than they are ACTIVELY EXOLIOTED with NOT ENOUGH ORGANIZATIONS MITIGATING that are PUTTING ORGANIZATIONS at RISK. Read More

US Warns Ransomware Threats during Holidays - Whoops! Too Late

US Warns Ransomware Threats during Holidays – Whoops! Too Late

Posted on September 2, 2021September 2, 2021

If you are reading about potential ransomware threats during the holidays, just know it is too late. By the time you get a call waking you up on a labor day holiday break, it would be too late to stop the ransomware threat. People forget that ransomware is the monetization network break-in. The THREAT is Read More

Categories

  • Conferences, Webinars, & Workshops
  • Cyberwar
  • DoD, DDoS, and Denial of Service
  • Empowering Humanity
  • ICS (Industrial Control Systems)
  • Internet
  • Operator's Security Toolkit
  • Product Security
  • Scaling
  • Security, Resiliency, and Scaling
  • Telecom
  • Threat Actors
  • Uncategorized
  • Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
    To find out more, including how to control cookies, see here: Cookie Policy