Security Leftovers
-
Incident Response in AWS
I envision this class as a way to help folks working in incident response prepare for and respond to an AWS compromise. It’s not intended to teach you how to set everything up, although I will refer to blog posts and IaC artifacts where appropriate. We cover the services from the perspective of why you need them, when to use them, and the cost/efficacy tradeoffs involved.
-
‘It feels like a digital hurricane’: Coastal Mississippi county recovering from ransomware attack [Ed: Windows TCO]
“From there, they systematically went through and locked out everybody's personal office computer. It was a highly coordinated attack and it also appears that after they encrypted all three servers, they went through each department looking at each individual computer to see what was the best data in there,” he said.
“So it was not just an automated attack. It definitely appears that there was a process and highly efficient one at that. Once they got behind the gate, that was it.”
-
Chainguard automates SBOMs, but has Images-based agenda
Container images, that is. Chainguard Enforce now automates SBOMs, but execs and an early customer say they aren't the ultimate answer to software supply chain security.
-
The history and evolution of ransomware [Ed: It is almost exclusively a Windows problem, but the media shies away from those statistics]
Ransomware has evolved from a malicious floppy disk demanding $189 in ransom to a multibillion-dollar industry with ransom for rent, sophisticated techniques and big-name victims.