Remove 10-reasons-to-run-a-cybersecurity-drill
article thumbnail

Everyday Threat Modeling

Daniel Miessler

A guy suffering from a meth addiction kicks in the front door and runs away with your TV. Now, as a cybersecurity professional who served in the Military, you have these scenarios bouncing around in your head, and you start contemplating what you’d do in each situation. Threat modeling is a superpower.

VPN 326
article thumbnail

Building Password Purgatory with Cloudflare Pages and Workers

Troy Hunt

I have lots of little ideas for various pet projects, most of which go nowhere ( Have I Been Pwned being the exception), so I'm always looking for the fastest, cheapest way to get up and running. I, in turn, have been considering how to not only consume the time of these spammers, but make it entertaining for all.

Passwords 350
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

Vamosi: That's Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency under the US Department of Homeland Security. What if you discovered a flaw in a ransomware payment system that unlocked the data without paying the ransom? Would you use it? Would you help others? Usually a certain amount of Bitcoin.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Ransomware

ForAllSecure

Vamosi: That's Chris Krebs, former director of the Cybersecurity and Infrastructure Security Agency under the US Department of Homeland Security. What if you discovered a flaw in a ransomware payment system that unlocked the data without paying the ransom? Would you use it? Would you help others? Usually a certain amount of Bitcoin.

Hacking 52