article thumbnail

Black Hat Fireside Chat: The impactful role crowdsourced security intelligence must play

The Last Watchdog

Bugcrowd ushered in crowdsourced security with its launch in 2012, and today a covey of vendors have followed suit, each supplying intricate platforms to connect hackers with proven skillsets to companies that have particular needs. With AI speeding everything up, triaging risks makes a lot of sense. I’ll keep watch and keep reporting.

article thumbnail

Identifying People Using Cell Phone Location Data

Schneier on Security

But way back in 2012, the Canadian CSEC—that’s their NSA—did some top-secret work on this kind of thing. He is based in a rural area, so he can’t risk making his ransom calls from that area. Nowadays, it seems like an obvious thing to do—although the search is probably unconstitutional.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft Issues Emergency Fix for IE Zero Day

Krebs on Security

Microsoft today released an emergency software patch to plug a critical security hole in its Internet Explorer (IE) Web browser that attackers are already using to break into Windows computers.

Internet 219
article thumbnail

The Internet is Held Together With Spit & Baling Wire

Krebs on Security

A visualization of the Internet made using network routing data. Imagine being able to disconnect or redirect Internet traffic destined for some of the world’s biggest companies — just by spoofing an email. Image: Barrett Lyon, opte.org. Based in Monroe, La., Lumen Technologies Inc.

article thumbnail

News Alert: i2Coalition launches ‘VPN Trust Initiative’ to promote VPN operators’ best practices

The Last Watchdog

26, 2023 — The Internet Infrastructure Coalition (i2Coalition) launched the VPN Trust Initiative (VTI) in 2020 to establish a baseline for how virtual private network (VPN) providers should operate. Social Responsibility: VPN providers will promote VPN technology to support access to the global Internet and freedom of expression.

VPN 100
article thumbnail

October 2023 Patch Tuesday Includes Three Zero-Days Flaws

eSecurity Planet

This CVE should be treated as a higher severity than Important due to the risk of exploit.” Ivanti’s Goettl noted that, as with the WordPad flaw, the CVE should be treated as a higher severity than its rating due to the risk of exploit. “End-of-life software poses a risk to an organization,” he said.

DDOS 109
article thumbnail

MY TAKE: The case for assessing, quantifying risks as the first step to defending network breaches

The Last Watchdog

Since its launch in 2012, the company has operated profitably, attracting customers mainly in Texas, Oklahoma, Louisiana and Arkansas and growing to 131 employees. Here are excerpts, edited for clarity and length: LW: What’s the difference between taking a ‘risk-oriented’ versus a ‘controlled-based’ approach to security?

Risk 147