home.social

#cybersecurityhistory โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #cybersecurityhistory, aggregated by home.social.

  1. ๐ŸŽฏ๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†: ๐—ง๐—ต๐—ฒ ๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜ ๐——๐—ฎ๐˜๐—ฎ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต, ๐——๐—ฒ๐—ฐ๐—ฒ๐—บ๐—ฏ๐—ฒ๐—ฟ ๐Ÿญ๐Ÿต, ๐Ÿฎ๐Ÿฌ๐Ÿญ๐Ÿฏ

    It started quietly, days before the holiday rush. Shoppers were filling stores, credit cards were swiping nonstop, and behind the scenes, a small foothold inside Targetโ€™s network was about to become one of the most infamous breaches in retail history.

    ๐Ÿ’€ Attackers slipped in through a third-party HVAC vendor
    ๐Ÿชฒ Malware moved silently across point-of-sale systems
    ๐Ÿ’ณ 40 million payment cards skimmed
    ๐Ÿ” 70 million customers' data exposed

    While many are (sadly) becoming numb to breach news nowadays, this disclosure, announced 12 years ago today, shook the industry. Boardrooms across the globe were confronted with the fact that cybersecurity wasnโ€™t just an IT problem, but a critical business-wide issue.

    The incident is covered very nicely in this Huntress article: huntress.com/threat-library/da

    Many books in the #CyberCanon address themes related to the breach. Here are two recos to get you started:

    ๐™‰๐™–๐™ซ๐™ž๐™œ๐™–๐™ฉ๐™ž๐™ฃ๐™œ ๐™ฉ๐™๐™š ๐˜ฟ๐™ž๐™œ๐™ž๐™ฉ๐™–๐™ก ๐˜ผ๐™œ๐™š discusses cyber risk at the board/executive level and uses high-profile cases to illustrate governance, risk oversight, and leadership implications. Our review๐Ÿ“: cybercanon.org/navigating-the-

    ๐™๐™๐™š ๐˜พ๐™„๐™Ž๐™Š ๐™‹๐™ก๐™–๐™ฎ๐™—๐™ค๐™ค๐™  is your go-to for structured guidance on integrating 3rd party risk into enterprise security strategy. Our review๐Ÿ“: cybercanon.org/the-ciso-playbo

    #CybersecurityBooks #CybersecurityHistory #DataBreach

  2. On November 24, 2014, Sony Pictures Entertainment experienced a landmark cyber-attack. A hacker group calling itself the โ€œGuardians of Peaceโ€ unleashed destructive malware, wiped large portions of the studioโ€™s network, and dumped terabytes of sensitive internal data.

    ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™’๐™–๐™ง๐™จ: ๐™ƒ๐™–๐™˜๐™ ๐™จ ๐™๐™๐™–๐™ฉ ๐™Ž๐™๐™ค๐™˜๐™ ๐™š๐™™ ๐™ฉ๐™๐™š ๐™’๐™ค๐™ง๐™ก๐™™, by Charles Arthur, covers this pivotal event amongst other cyber attacks.

    See our review ๐Ÿ‘‰ cybercanon.org/cyber-wars-hack

    #CybersecurityHistory #SonyHack #CyberWar #CybersecurityBooks

  3. ๐Ÿ“…๐—ง๐—ผ๐—ฑ๐—ฎ๐˜† ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—›๐—ถ๐˜€๐˜๐—ผ๐—ฟ๐˜†!

    On November 2, 1988, the Morris Worm became the first major computer virus to spread across the Internet. What began as a graduate studentโ€™s โ€œexperimentโ€ quickly spiraled out of control, taking down much of the early Internet and costing millions in cleanup. It also gave rise to one of cybersecurityโ€™s most important realizations: even well-intentioned code can cause catastrophic damage in a connected world.

    To learn more, ๐™๐™–๐™ฃ๐™˜๐™ฎ ๐˜ฝ๐™š๐™–๐™ง ๐™‚๐™ค๐™š๐™จ ๐™‹๐™๐™ž๐™จ๐™๐™ž๐™ฃ๐™œ by Scott Shapiro, a #CyberCanonHoFCandidate, covers the #MorrisWorm as one of its five infamous hacks. See our review โžก๏ธ tinyurl.com/r2b3zc2u

    ๐Ÿ’ฅAnd as a bonus, many may not be aware that ๐™๐™๐™š ๐˜พ๐™ช๐™˜๐™ ๐™ค๐™ค'๐™จ ๐™€๐™œ๐™œ also contains an interesting perspective on the Morris Worm. A year after astronomer Cliff Stoll's spy tracking journey, he was one of many admins around the country who were investigating the Morris Worm live as it was spreading through the night. Cliff writes about this experience in the book's epilogue, where he discovers that the author of the worm was actually the son of NSA's Chief Scientist, Robert Morris, whom Cliff worked with in relation to his international hacker sleuthing a year earlier.

    #CyberCanonHoF review โžก๏ธ tinyurl.com/3rywf7zw

    #CyberCanon #CybersecurityHistory #CybersecurityBooks