This week in cyber, with pictures :)

This week in cyber, with pictures :)

This week in cyber, what you may have missed in the week noise on my end.

It's getting challenging to keep attention on content we get all the time, and I'm culprit from time to time of reacting just on the headline as well.

So trying to respect your time, and THANKS for reading ! :)

1 - A good guide on How to secure microservices (Yes it's about Kubernetes or K8 and overall container based services orchestration)

No alt text provided for this image

2 - A CDN with expired certificate is bringing chaos in Microsoft tool - Microsoft WinGet package manager failing from expired SSL certificate

3 - By now you should have patched Goanywhere if you used it : Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day

4 - GUAC Explained in 5 Minutes (Graph for Understanding Artifact Composition)

No alt text provided for this image

5 - AI betrayed truth :D Arguing with AI: My first dispute with Microsoft’s brilliant and boneheaded new Bing search engine (not mine, but author's of the article)

6 - LearnPress vulnerabilities: the importance of updating your plugins (in WordPress)

No alt text provided for this image

7 - Webinar : Understanding ‘Lone Wolf’ Attacks?Dissecting and Modeling 2022’s Most Powerful Cyber Attacks

No alt text provided for this image

8 - Have you fixed your secret exposure in your software development life cycle management tools ? Exposing secrets via SDLC Tools (sonarqube take)

No alt text provided for this image

9 - Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices

No alt text provided for this image

10 - Concerning to see Amazon becoming the Pentagon's communication infrastructure - Amazon’s Kuiper satellites are good to go after FCC’s approval of orbital debris plan

XI - 7 Critical Cloud Threats Facing the Enterprise in 2023

12 - Criminal Hackers breach Reddit to steal source code and internal data

13 - Ultimate CISO Guide to Selecting a Security Partner in 2023

No alt text provided for this image

14 - How do I validate my security controls to make sure my security posture is effective ? By Orenda Security

How do I validate my security controls to make sure my security posture is effective ?


15 - Attack Surface Reduction: 7 Expert Tips to Defend Your Organization

16 - 2023: Time to Secure Active Directory and Azure AD

No alt text provided for this image

17 - Amazon S3 to apply security best practices for all new buckets

18 - Researcher breaches Toyota supplier portal with info on 14,000 partners, and automotive industry really sell connected cars ! That's a nightmare !

19 - Illicit Telegram Groups: A New Dark Web Frontier?

No alt text provided for this image

20 - 5 Steps to Build a People-First Business Continuity Plan (on demand webinar)

21 - How Zero-Trust Security Helps Manufacturers Achieve Digital Transformation Success

How Zero-Trust Security Helps Manufacturers Achieve Digital Transformation Success

22 - Cloud leaders Amazon, Google and Microsoft show the once-booming market is cooling down (Finally !!)

So I'm wrapping with this amazing news on point 22 above :D

Wishing you an amazing day, I hope your weekend goes well ! Happy Sunday all !




Spencer La Placa, Security Plus, CEH

Certificates: Security + ce-601, Certified Ethical Hacker (CEH), Certified Ethical Hacker Practical (CEH-Master), Certified Network Defender (CND), Microsoft AZ-900, Currently Enrolled EC-Council M.S. Cybersecurity

1 年

Another informative week of why being connected=hacked. Stay alert and stay vigilant. Thanks for all your work Alexandre.

Gordon S. Kerman

IT Manager / CyberSecurity / Software Dev / IT Engineering Manager: Science, Engineering and Manufacturing

1 年

Ah yes, Alexandre BLANC Cyber Security, the ever so tricky necessity of keeping the attention, of folk, who by their very nature, have little time for "diversions". I learned this myself, many years ago in business; how do you naturally keep the attention of folk, who normally have little time to digest, in their off hours. There is a trick about business that I learned, and it was my customers that taught it to me. It has to do with how you approach your customers, in the manner of doing business. I would mention it; but if I ever go into business again (pretty fair chance that I will) I'll be using this method to stay well-ahead of all competitors :} I will state that you are not only providing your connections with integrally (and immersively) important posts; you're also acting as a conduit to make conversations occur, that might not have occurred otherwise. In essence you're an influencer that initiates: The Cyber Knights of the Round Table :}

George M. Pierides

Social Media Assistant at G.M. Pierides Gift & Accessories

1 年

Cyber Shield, is a combination of COMMUNICATING VESSELS, in full DETAILS! So easy, and so DIFFICULT! All the best! Michalakis Pierides family Half Occupied Cyprus

  • 该图片无替代文字
Cynthia O'Brien

Retired - DoD Senior Information Systems Security Engineer

1 年

You try, but you can not be everything to everyone. Thank you for your posts.

要查看或添加评论,请登录

社区洞察

其他会员也浏览了