The hottest Cyberattacks Substack posts right now

And their main takeaways
Category
Top Technology Topics
Unmasking Russia β€’ 176 implied HN points β€’ 09 Feb 24
  1. Ukraine is facing a critical shortage of military hardware, including missiles, and is in urgent need of support from foreign allies like the US.
  2. Lawmakers from Baltic and Nordic countries expressed concern over the lack of urgency from the US in helping Ukraine defend against Russia's invasion, warning of potential dire consequences.
  3. Recent intelligence reports suggest that Russia is rapidly rearming and may pose a threat to NATO countries within the next three to five years, prompting calls for increased military investments and sanctions by the EU.
Metacurity β€’ 39 implied HN points β€’ 10 Feb 24
  1. London Underground is testing AI surveillance tools to monitor passengers, aiming to improve safety but facing challenges like recognizing objects accurately and potential privacy concerns.
  2. Transitioning from passwords to passkeys promises enhanced security but requires users to adapt to new ways of authentication and storage methods like dedicated password managers or physical security keys.
  3. Using SMS for account logins can lead to security vulnerabilities like SIM-swap attacks; companies should offer more secure alternatives like Authy or Google Authenticator to improve security measures.
Rod’s Blog β€’ 99 implied HN points β€’ 17 Oct 23
  1. Microsoft Sentinel helps in detecting and mitigating brute-force attacks on VIP accounts, which are high-level privileged user accounts in organizations.
  2. Brute-force attacks involve trying multiple passwords to gain unauthorized access to accounts or systems, making VIP accounts attractive targets.
  3. Organizations can use Microsoft Sentinel to set thresholds for failed logon attempts, create custom detection rules, investigate alerts triggered by VIP accounts, and take necessary response actions.
Seriously Risky Business β€’ 0 implied HN points β€’ 08 Feb 24
  1. US faces cybersecurity threat from Chinese group Volt Typhoon targeting critical infrastructure
  2. US government took action to disrupt botnet used by Volt Typhoon for command and control
  3. CISA issued emergency directive for federal agencies to disconnect Ivanti VPN products due to exploitation by UTA0178 group
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Seriously Risky Business β€’ 0 implied HN points β€’ 27 Apr 23
  1. North Korea has a unique approach to targeting priorities and operations, focusing on 'access begets access' which differs from tightly scoped operations by Five Eyes agencies.
  2. Iran shows a shift in cyber operations policy, engaging in destructive attacks targeting US critical infrastructure potentially as a response to previous cyberattacks on Iran.
  3. Privacy concerns arise regarding governments purchasing netflow data, but Team Cymru's data is selectively ingested for cyber threat analysis and unlikely to contribute to mass surveillance.