In this episode we discuss three articles. First, a brief summary of security planning in mergers and acquisitions. Second, what's most important during a security incident? Finally, PROCESS GHOSTING!
Article 1 - How to Plan Your M&A Security Strategy
Supporting Articles:
Marriott data breach FAQ: How did it happen and what was the impact?
Why Evaluating Cybersecurity Prior to Mergers and Acquisitions is Necessary
Article 2 - Mission Critical: What Really Matters in a Cybersecurity Incident
Supporting Articles:
Malware Archaeology Logging Cheat Sheets
NIST 800-61: Computer Security Incident Handling Guide
Article 3 - Researchers Uncover 'Process Ghosting' — A New Malware Evasion Technique
Supporting Articles:
Process Doppelganging: New Malware Evasion Technique Works On All Windows Versions
Herpaderping: Security Risk or Unintended Behavior?
Submitted Github issue to allow ProcessHacker to detect these methods of evasion
As always, please subscribe on your favorite podcast app, and rate and review so that other people will come to know and love us as much as our mothers do
In this episode, we discuss street criminals turning from drug related crime to fraud and potentially cybercrime, and PyPI's issues with malicious packages. Article...
This week, David and I discuss how GM is fraudulently collecting driving data and selling it to insurers, and Anton Chuvakin has another article...
In this episode, we review some recent news articles that caught our eye, ranging from record breaking DDOS to avoiding burnout and invisible variables!...