article thumbnail

The Theory and Motive Behind Active/Active Multi-Region Architectures

Security Boulevard

The date was 24th December 2012, Christmas eve. The post The Theory and Motive Behind Active/Active Multi-Region Architectures appeared first on Security Boulevard. The world’s largest video streaming service, Netflix experienced one of its worst incidents in company history.

article thumbnail

Threat Model Thursday: Architectural Review and Threat Modeling

Adam Shostack

For Threat Model Thursday, I want to use current events here in Seattle as a prism through which we can look at technology architecture review. The cost of a house has risen nearly 25% above the 2007 market peak , and has roughly doubled in the 6 years since April 2012. Seattle has a housing and homelessness crisis.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Anton on Security

In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ). Cloud providers haven’t necessarily simplified this journey for customers, even though, compared to 2012 , decent logs actually exist today in many cases.

article thumbnail

Deadglyph, a very sophisticated and unknown backdoor targets the Middle East

Security Affairs

Stealth Falcon is a nation-state actor active since at least 2012, the group targeted political activists and journalists in the Middle East in past campaigns. The attacks have been conducted from 2012 until 2106, against Emirati journalists, activists, and dissidents.

Spyware 114
article thumbnail

Today, You Really Want a SaaS SIEM!

Anton on Security

Anton’s old SIEM presentation from 2012 ( source , date: 2012) Before we go, we need to separate the SIEM tool operation difficulties from the SIEM mission difficulties. And let me tell you … that “n” is pretty damn large since my first involvement with SIEM in January 2002 (!)?—? examples , examples , examples.

article thumbnail

A SOC Tried To Detect Threats in the Cloud … Your Won’t Believe What Happened Next

Security Boulevard

In this post, I wanted to quickly touch on this very topic and refresh some past analysis of this (and perhaps reminisce on how sad things were in 2012 ). Cloud providers haven’t necessarily simplified this journey for customers, even though, compared to 2012 , decent logs actually exist today in many cases.

article thumbnail

Threat actor claims to have stolen 1 TB of data belonging to Saudi Aramco

Security Affairs

This isn’t the first attack suffered by the Oil giant, in 2012 Saudi Aramco suffered a major cyber attack, alleged nation-state actors used the Shamoon wiper to destroy over 30,000 computers of the company. ZeroX is also offering a 1 GB sample for US$2,000 that could be paid in Monero (XMR) virtual currency.