Monthly Archives - June 2019

Speaking @ Cybersecurity: Securing Africa’s Businesses

Africa is a region often overlooked when it comes to cybersecurity. Although cyber infrastructure is not as developed as in other regions, African companies must look to secure their business in order to protect from data leaks and cyber attacks, such as the Wannacry ransomware in 2017. How best then to protect from cyber attacks? Invest Africa invites you to join [...]


Posted By Category: GeneralTags: , , Comments: 0

Amazon Best Seller (again)

We did again:) Our award winning book Cybersecurity Attack and Defense Strategies Books hits this month, Amazon's Best Selling list. Yuri and I are really proud and of course Thankful for all your support buying the book, taking time to share your feedback and pushing us to be better, Thank you dear readers we appreciate it Yuri and Erdal


Virus Bulletin : Lazarus Group: a mahjong game played with different sets of tiles

Please go ahead and click the link below to read the full article .  Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the Lazarus Group, a.k.a. Hidden Cobra, has grown rapidly since its estimated establishment in 2009. This notorious group intensified its efforts in 2017 (e.g. [...]


Posted By Category: Cyber Security, Security Review / ReportsTags: , Comments: 0

Keynote at Sony R&D Conference

I am proud to announce that I am invited to deliver a Keynote, as Guest Speaker at the internal Sony Research and Development Conference this week, in the United Kingdom. As usual, I will be speaking all about CyberSecurity. Event Dates : 18-19 June , London...


Information Gathering Methods

Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data [...]


Does Apple spy’s on your iPhone? Gartner / Microsoft Feedback

I am sure most of you read by now my article "Apple and Privacy ", for the ones who did not I highly recommend to read it,( here is the link ) below are some public feedback which I have received via LinkedIn from Gartner, Microsoft, Australian Government employees. I will also share some of the feedbacks which I [...]


CROWDSTRIKE GLOBAL THREAT REPORT 2019

Adversary Tradecraft and The Importance of Speed The 2019 CrowdStrike® Global Threat Report offers one of the industry’s most comprehensive reports on today’s top cyberthreats. It combines analysis from CrowdStrike Threat Intelligence, Falcon OverWatch™ managed hunting and the CrowdStrike Services incident response teamshighlighting the most significant events and trends in the past year. It combines CrowdStrike’s comprehensive global observations with real-world case studies to [...]


Social Engineering 101

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick [...]


Apple and Privacy

Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you [...]


Hackers steal 19 years’ worth of data from the Australian National University

News from ESET We Live Security A premier Australian university has disclosed a cyberattack that compromised the personal information of its students and staff extending back nearly two decades. “We believe there was unauthorized access to significant amounts of personal staff, student and visitor data extending back 19 years,” reads a statement from Brian Schmidt, Vice-Chancellor of the Australian National University (ANU). The stolen [...]