2023’s Cybersecurity Landscape
Supply Chain, remote workers, and remote tools. All are on the list of cybersecurity threat sources for 2023. Thought I’d share a link. https://www.securityinfowatch.com/cybersecurity/article/21291257/ominous-2023-cybersecurity-threats-ensure-an-active-landscape More than ever, corporations need to keep an eye on the threat landscape and predictions of the experts. Devices matter less than their access.
Cloud computing has become an essential part of many businesses’ IT infrastructure. It provides a range of benefits, including increased scalability, flexibility, and cost savings. However, with the rise of cloud computing, there is also an increased risk of cyber attacks, making it more important than ever to secure cloud systems. The cloud environment is…
Left your keys at the restaurant?
Toyota left their access key in a public GitHub repository for 5 years. That’s right, five years. This code is related to their T-connect service. Here is the article, courtesy of Infosecurity Group Magazine. A couple of thoughts here- this is the result of an error that was made by a contract website development professional.…
Cybersecurity and Cat Voodoo
You are not prepared. This blog has turned its focus away from the political nightmare that is beyond saving and instead is moving towards cybersecurity and the pursuit of cyber defense. Why Cat Voodoo? Well if you have ever had a cat, you know the voodoo they work whenever they step across your keyboard while…
Sharkbot Banking Trojan on Google Play
So what does a Trojan do on your phone? Simple- it disguised itself as an antivirus application before it took over your phone and spied on your banking activities and other activities. What’s the software named? It’s an update for the applications “Mr Phone Cleaner” and “Kylhavy Mobile Security”. Not being an android user, I…