article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

military officials hired data analysts to crack the Japanese secret code known as JN-25. After analysts cracked the code, Commander Joseph Rochefort could relay the Japanese Navy’s future plans to Admiral Chester Nimitz. After the devastating blow of Pearl Harbor, U.S.

article thumbnail

GCHQ implements World War II cipher machines in encryption app CyberChef

Security Affairs

.” CyberChef was published as open source on GitHub, it allows users to analyze encryption, compression and decompression, and data formats with simple drag and drop operations. The tool could be used to manipulate different types of data, decode Base64 strings, convert data from a hexdump and perform many other operations.

article thumbnail

Applying Heuristics in Cybersecurity

Approachable Cyber Threats

Data analysts aren’t immune to the ill effects of the recognition heuristic either. Availability bias can impact data analysis just as much as the alternative informal mental meanderings that we use most of the time. a cyber incident/data breach) and loss events (e.g. This results in a suboptimal learning environment.