Category: In the News

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/21/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/21/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

    Featured Analysis

    Featured article analysis: Former Disney employee who hacked Disney World restaurant menus in revenge sentenced to 3 years in federal prison

    This case highlights a serious insider threat incident with significant potential consequences. Michael Scheuer, a former Disney World employee, conducted a series of cyberattacks against his former employer, demonstrating a disturbing level of knowledge about the company’s systems. His actions went beyond mere vandalism, as he manipulated allergen information on restaurant menus, creating a dangerous situation that could have resulted in severe harm or even death for customers with allergies. This element of the attack underscores the malicious intent and the potential for real-world harm that can arise from disgruntled employees with system access.

    The incident also reveals the complexity and scope of modern cyberattacks. Scheuer’s actions included manipulating menu information, altering wine region details to reference mass shooting locations, and launching denial-of-service attacks. This multi-faceted approach demonstrates the potential for a single individual to disrupt operations, spread misinformation, and target individuals within an organization. The FBI’s involvement and the subsequent prosecution emphasize the severity of these crimes and the importance of robust cybersecurity measures to protect against both external and internal threats.

    Ultimately, this case serves as a stark reminder of the importance of robust cybersecurity practices, including access control, monitoring, and incident response. The fact that Scheuer had the knowledge and access to carry out these attacks highlights the need for organizations to carefully manage employee access to sensitive systems, especially during and after termination. The potential for significant financial damage (as indicated by the restitution order) and the severe criminal penalties underscore the legal and financial ramifications of such cybercrimes.

    Projects

    • TryHackMe – Networking Secure Protocols – Complete
    • TryHackMe – Tcpdump: The Basics – In Progress

    Whitepapers

    Videos

    Articles

    Podcasts

  • What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/14/25

    What’s New in Cybersecurity This Week: Projects, Videos, Articles & Podcasts I’m Following – 4/14/25

    Welcome to my weekly cybersecurity roundup! Here, I share updates on the projects I’m currently working on, along with the most insightful cybersecurity videos I watched, articles I found valuable, and podcasts I tuned into this week.

    Featured Analysis

    Featured article analysis: CVE, global source of cybersecurity info, was hours from being cut by DHS

    This near-miss scenario involving the potential defunding of the CVE program by the DHS serves as a stark reminder of the precarious nature of critical cybersecurity infrastructure. The article highlights the indispensable role the CVE repository plays as the bedrock of vulnerability management. The cascading effects described by Brian Martin – the fragmentation of vulnerability data, the rise of incomplete databases, and the increased exposure of organizations – underscore the global reliance on this standardized system for identifying, tracking, and addressing security flaws. The fact that even this foundational element was at risk of disruption due to governmental budgetary shifts and political headwinds should galvanize the community to recognize the need for more resilient and independent stewardship of such vital resources.

    The swift action by CVE board members to establish the CVE Foundation as a nonprofit represents a proactive and commendable step towards ensuring the long-term stability of the program. This move acknowledges the inherent vulnerabilities of relying solely on government funding and demonstrates a commitment to the cybersecurity ecosystem’s well-being. The involvement of major tech players and international organizations as CNAs further emphasizes the collaborative and global nature of vulnerability disclosure and management that the CVE program facilitates.

    Projects

    • TryHackMe – Networking Secure Protocols – In Progress

    Videos

    Articles

    Podcasts

  • What is Mastodon?

    What is Mastodon in 180 Seconds

    I’m loving mastodon and I’m huge fan. With everyone comparing it to Twitter it makes describing it more challenging. You have to forget the idea of Twitter to really understand it. This video does a great job of quickly describing it.

  • ChatGPT Learning Possibilities

    …and ways people can take advantage of this new artificial intelligence.

    I’ve been hearing a lot about ChatGPT and I wanted to explore more of what it can do. I wanted to see how easy it was to use myself. I created a user account and typed in my prompt:

    write an information article about software bill of materials in easy to understand terms

    I published what I got as a post on this website. This strikes me as interesting initially in two ways. First, I can type in questions and have this AI produce short and easy to understand articles for me to learn more about whatever topic I want, probably cybersecurity for the moment.

    Secondly, I could also have it write lots of content for this blog or any other along with google adwords or anything else. All I’m doing is posting content, and I don’t even have to write it anymore. ChatGPT comes up with the content about a subject I want it to write about and people visit the site to read the content. I mean it’s not horrible content after all. Nothing really wrong with it.

    This could flood the internet with many useless sites that are written by the same AI. Yes, I’m well aware that the internet is already flooded with lots of useless content, but not all of it is generating revenue for the owners. Just an idea. This is pretty neat, but getting a little scary quickly too!

  • Software Bill of Materials (SBOM)

    A software bill of materials (SBOM) is a comprehensive list of all the individual components that make up a piece of software. This list includes both the source code and any external libraries or other dependencies that are necessary for the software to function properly.

    Having an SBOM is important for several reasons. First, it allows developers and other stakeholders to easily see exactly what is included in a piece of software, making it easier to identify any potential security vulnerabilities or other issues. It also makes it easier to track down and fix bugs, as well as to keep the software up to date with the latest versions of its components.

    Additionally, an SBOM can help organizations comply with various regulations and industry standards that require them to disclose the components that make up their software. This is especially important in industries such as healthcare and finance, where the use of certain components may be restricted or prohibited due to security concerns.

    Creating an SBOM can be a time-consuming process, as it requires developers to carefully review and document all of the individual components that make up their software. However, there are tools and frameworks available to help automate this process, making it easier to create and maintain an SBOM.

    Overall, a software bill of materials is a valuable tool for any organization that develops or uses software. It allows developers to easily see and manage the components that make up their software, and helps organizations comply with regulations and industry standards.

    *This article was written using ChatGPT.

  • Cybersecurity Articles | Week of October 24, 2022

  • Great Recent Articles