In this episode we discuss three articles. First, a brief summary of security planning in mergers and acquisitions. Second, what's most important during a security incident? Finally, PROCESS GHOSTING!
Article 1 - How to Plan Your M&A Security Strategy
Supporting Articles:
Marriott data breach FAQ: How did it happen and what was the impact?
Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary
Article 2 - Mission Critical: What Really Matters in a Cybersecurity Incident
Supporting Articles:
Malware Archaeology Logging Cheat Sheets
NIST 800-61: Computer Security Incident Handling Guide
Article 3 - Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique
Supporting Articles:
Process Doppelganging: New Malware Evasion Technique Works On All Windows Versions
Herpaderping: Security Risk or Unintended Behavior?
Submitted Github issue to allow ProcessHacker to detect these methods of evasion
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
Matthew ran a little late this weekend, so apologies for being a day late deploying the latest security news into your earhole! We talk...
In this episode, we go deep down the paranoid rabbit hole to discuss what the government would do with facial recognition technology, and we...
In this episode, we reviewed some recent news articles that caught our eye, including an empirical study confirming what everyone always knew about putting...