In this episode we discuss three articles. First, a brief summary of security planning in mergers and acquisitions. Second, what's most important during a security incident? Finally, PROCESS GHOSTING!
Article 1 - How to Plan Your M&A Security Strategy
Supporting Articles:
Marriott data breach FAQ: How did it happen and what was the impact?
Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary
Article 2 - Mission Critical: What Really Matters in a Cybersecurity Incident
Supporting Articles:
Malware Archaeology Logging Cheat Sheets
NIST 800-61: Computer Security Incident Handling Guide
Article 3 - Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique
Supporting Articles:
Process Doppelganging: New Malware Evasion Technique Works On All Windows Versions
Herpaderping: Security Risk or Unintended Behavior?
Submitted Github issue to allow ProcessHacker to detect these methods of evasion
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
Malicious OAuth apps are coming for your Exchange admins! Oh noes! Also, Powerpoint gets in the malware delivery game and it turns out that...
In our continual search for the most useful Information Security Report, chock full of insight and wisdom, we review the Talos Inaugural Year In...
David and I sit down to discuss a new article from an insurer stating that Cyber Insurance is going to get more expensive than...