Remove how-protect-data-and-defend-against-state-sponsored-hackers
article thumbnail

The Art of (Cyber) War

Approachable Cyber Threats

In the modern age, nation states are expanding the battlefield with targeted cyber attacks on their adversaries. Nation states have always sought advantages to increase their geopolitical power and secure their interests both domestically and abroad. Who are the hackers? Are you at risk? Why cyber attacks?” Are they military?”

DDOS 98
article thumbnail

Recapping Cisco Secure at Black Hat USA 2021

Cisco Security

There is always excitement in the air throughout the Security community at this time of year; usually we excitedly approach “Hacker Summer Camp.” For a complete list of Cisco-sponsored sessions, demos and resources, visit the Cisco Secure Black Hat page. Read on for details…. ” -Wendy Nather.

Backups 134
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

I wanted to both write and direct, having no idea how to get from my humble home to Hollywood. I did get a film degree in college, along with an English degree, but after college, well, knowing how the sausage was made, I wasn’t keen on going to Hollywood. Now I’m hosting a podcast called The Hacker Mind.

InfoSec 40
article thumbnail

‘Unpacking’ technical attribution and challenges for ensuring stability in cyberspace

SecureList

The rest of the world, including the victims of the attack, must often engage in some degree of speculation to explain the events and devise ways to protect themselves accordingly. How then can they find out who was behind an attack and why? Our key discussion points include: How is technical attribution carried out?

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome. Building the Hacker Summer Camp network, by Evan Basta. Mapping Meraki Location Data with Python, by Christian Clausen. The Cisco Stack’s Potential in Action, by Paul Fidler. The Buck Stops Here.

article thumbnail

Ransomware world in 2021: who, how and why

SecureList

In this report, we take a step back from the day-to-day ransomware news cycle and follow the ripples back into the heart of the ecosystem to understand how it is organized. Next, we dive deep into the darknet to demonstrate how cybercriminals interact with each other and the types of services they provide. And not without good reason.