#cybersecurityhistory โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cybersecurityhistory, aggregated by home.social.
-
๐ฏ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐: ๐ง๐ต๐ฒ ๐ง๐ฎ๐ฟ๐ด๐ฒ๐ ๐๐ฎ๐๐ฎ ๐๐ฟ๐ฒ๐ฎ๐ฐ๐ต, ๐๐ฒ๐ฐ๐ฒ๐บ๐ฏ๐ฒ๐ฟ ๐ญ๐ต, ๐ฎ๐ฌ๐ญ๐ฏ
It started quietly, days before the holiday rush. Shoppers were filling stores, credit cards were swiping nonstop, and behind the scenes, a small foothold inside Targetโs network was about to become one of the most infamous breaches in retail history.
๐ Attackers slipped in through a third-party HVAC vendor
๐ชฒ Malware moved silently across point-of-sale systems
๐ณ 40 million payment cards skimmed
๐ 70 million customers' data exposedWhile many are (sadly) becoming numb to breach news nowadays, this disclosure, announced 12 years ago today, shook the industry. Boardrooms across the globe were confronted with the fact that cybersecurity wasnโt just an IT problem, but a critical business-wide issue.
The incident is covered very nicely in this Huntress article: https://www.huntress.com/threat-library/data-breach/target-data-breach
Many books in the #CyberCanon address themes related to the breach. Here are two recos to get you started:
๐๐๐ซ๐๐๐๐ฉ๐๐ฃ๐ ๐ฉ๐๐ ๐ฟ๐๐๐๐ฉ๐๐ก ๐ผ๐๐ discusses cyber risk at the board/executive level and uses high-profile cases to illustrate governance, risk oversight, and leadership implications. Our review๐: https://cybercanon.org/navigating-the-digital-age-the-definitive-cybersecurity-guide-for-directors-and-officers/
๐๐๐ ๐พ๐๐๐ ๐๐ก๐๐ฎ๐๐ค๐ค๐ is your go-to for structured guidance on integrating 3rd party risk into enterprise security strategy. Our review๐: https://cybercanon.org/the-ciso-playbook/
-
On November 24, 2014, Sony Pictures Entertainment experienced a landmark cyber-attack. A hacker group calling itself the โGuardians of Peaceโ unleashed destructive malware, wiped large portions of the studioโs network, and dumped terabytes of sensitive internal data.
๐พ๐ฎ๐๐๐ง ๐๐๐ง๐จ: ๐๐๐๐ ๐จ ๐๐๐๐ฉ ๐๐๐ค๐๐ ๐๐ ๐ฉ๐๐ ๐๐ค๐ง๐ก๐, by Charles Arthur, covers this pivotal event amongst other cyber attacks.
See our review ๐ https://cybercanon.org/cyber-wars-hacks-that-shocked-the-world
#CybersecurityHistory #SonyHack #CyberWar #CybersecurityBooks
-
๐ ๐ง๐ผ๐ฑ๐ฎ๐ ๐ถ๐ป ๐๐๐ฏ๐ฒ๐ฟ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐๐ถ๐๐๐ผ๐ฟ๐!
On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโs โexperimentโ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโs most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.
To learn more, ๐๐๐ฃ๐๐ฎ ๐ฝ๐๐๐ง ๐๐ค๐๐จ ๐๐๐๐จ๐๐๐ฃ๐ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โก๏ธ https://tinyurl.com/r2b3zc2u
๐ฅAnd as a bonus, many may not be aware that ๐๐๐ ๐พ๐ช๐๐ ๐ค๐ค'๐จ ๐๐๐ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.
#CyberCanonHoF review โก๏ธ https://tinyurl.com/3rywf7zw