Jeff W.'s Avatar

Jeff W.

@southlakecyber

Musings around Cybersecurity | Governance | Risk | Privacy | Compliance | Audit

132
Followers
157
Following
695
Posts
20.11.2023
Joined
Posts Following

Latest posts by Jeff W. @southlakecyber

Preview
Cyber Budgets Slow, AI Surges: What the Data Says About 2026 In a mixed economic environment, how are cybersecurity budgets competing among business priorities, and what may be ahead for 2026?

“Cyber Budgets Slow, AI Surges: What the Data Says About 2026”

07.12.2025 23:10 👍 0 🔁 0 💬 0 📌 0
Preview
Most Companies Fear State-Sponsored Cyber-Attacks New IO study claims 88% of US and UK firms are concerned about state-sponsored cyber-attacks

👉 “Organizations that understand their exposure, test their defenses, and secure their supply chains will be best placed to withstand the next wave of attacks,” argued Sam Peters, Chief Product Officer at IO.

04.12.2025 13:41 👍 1 🔁 0 💬 0 📌 0
Preview
Penn institutes mandatory information security training for all employees following data breach All Penn faculty and staff — including student workers and postdoctoral students — will be required to complete the training.

Never let a good crisis go to waste!

If your organization doesn't have security awareness training, don't let cost or complexity be the roadblock. There are lots of good resources out there to throw into a slide deck. It's better than doing nothing.

03.12.2025 22:15 👍 1 🔁 0 💬 0 📌 0
Preview
Tenable: AI and Hybrid Cloud Growth Outpacing Security Defenses Tenable warns cloud and AI adoption outpace defenses, with 34% of AI workloads already linked to breaches.

Most businesses now operate multiple, complex cloud environments, but many face major security gaps and have suffered AI-related breaches.

17.10.2025 17:03 👍 1 🔁 0 💬 0 📌 0
Preview
Does TSA Let You Travel With A Flipper Zero In Your Carry-On Luggage? - BGR There are no official TSA restrictions for the Flipper Zero, but that doesn't mean you won't be stopped or questioned by a curious agent for carrying one.

I travel with my FZ all the time and have never had an issue. Are these folks waving it around?

16.10.2025 19:18 👍 1 🔁 0 💬 0 📌 0
Preview
Strip club execs bribed auditor with private dances, free trips to avoid paying millions of dollars in taxes, charges say RCI Hospitality Holdings received favorable treatment during at least six tax audits in exchange for the perks given to a state auditor, authorities said.

🤣 "According to the indictment, the auditor texted ... "This was the best trip I had in Florida. The girls were very beautiful and nice."

15.10.2025 23:01 👍 2 🔁 0 💬 1 📌 0

Time's up! ⏰

Upgrade to Windows 11 (if your PC supports it), purchase a new device with Windows 11 or another OS, or enroll in the Extended Security Updates (ESU) program for one more year of updates.
www.engadget.com/com...

14.10.2025 18:25 👍 0 🔁 0 💬 0 📌 0
Preview
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns Astaroth banking trojan exploits GitHub for resilience, targeting Latin American users via phishing.

A newly observed Astaroth banking trojan campaign leverages GitHub to keep its operations running even when traditional command-and-control infrastructure is disrupted.

13.10.2025 19:56 👍 0 🔁 0 💬 0 📌 0
Preview
CMMC Is Finalized. How Will It Impact State and Local Government? What is Cybersecurity Maturity Model Certification from the Department of Defense and why should state and local governments care about it? How agencies can leverage funding to grow their security programs.

"CMMC Is Finalized. How Will It Impact State and Local Government?"

07.10.2025 23:34 👍 0 🔁 0 💬 0 📌 0
Preview
Microsoft Entra ID flaw allowed hijacking any company's tenant A critical combination of legacy components could have allowed complete access to the Microsoft Entra ID tenant of every company in the world.

The use of undocumented, unsigned actor tokens, coupled with a legacy API vulnerability, created a perfect storm.

25.09.2025 17:41 👍 2 🔁 0 💬 0 📌 0
Preview
Jaguar Land Rover shutdown extended again after cyber attack The business secretary will also meet suppliers of the car maker who are at risk of closure.

Recovery Time Objective and Maximum Tolerable Downtime are often confused. Here's a great example where I'm sure the RTO was hours (or less) and the MTD is apparently weeks - however the question of JLRs future viability is still unanswered.

24.09.2025 23:30 👍 2 🔁 0 💬 0 📌 0
Preview
The Silent Threat: How Misconfigurations Fuel the Cyber Crime Economy Billions of records are breached each year as a result of misconfigured servers, firewalls and other network devices. What can be done? Let’s explore.

Yes, Virginia. Security IS hard.
Few clients I encounter have implemented baseline configs and hardening, yet these are essential. Combine with vuln scans and periodic pentests, and you create a stronger and more secure foundation.

23.09.2025 13:05 👍 1 🔁 0 💬 0 📌 0
Preview
Microsoft to force install the Microsoft 365 Copilot app in October Next month, Microsoft will begin automatically installing the Microsoft 365 Copilot app on Windows devices outside the European Economic Area (EEA) region that have the Microsoft 365 desktop client apps.

Now would be a great time to look into what control gaps might be created and available tooling to block its use, if needed.

21.09.2025 21:02 👍 0 🔁 0 💬 0 📌 0

Check out Offensive Countermeasures: The Art of Active Defense by John Strand if you're interested in more information on the topic.

16.09.2025 20:13 👍 2 🔁 0 💬 0 📌 0
Preview
Cyber Privateers: The Return of the Hack-Back Debate Is the second Trump administration open to private-sector companies — or non-military or other government agencies — using offensive security against cyber threats?

One of the things that concerns me about OffSec is that you don't often know your adversary very well. Just like the old saying goes, don't bring a knife to a gunfight.

16.09.2025 20:12 👍 3 🔁 0 💬 1 📌 0
St. Paul, Minn., Systems Come Back Online After Cyber Attack The city is gradually restoring online services after a ransomware attack in July interrupted them. Phone service, online water bill payments, and Parks and Recreation payment systems are among those restored.

🥇“We are now in recovery . . . Our approach is deliberate, prioritized, and secure: systems are brought back only after testing and validation, with priority given to those essential for public safety, financial stability, and daily operations.”

07.09.2025 14:05 👍 2 🔁 0 💬 0 📌 0

Great summary of some often-forgotten information security controls. Partnering with your facilities team is the best way to ensure you can be successful.

07.09.2025 13:32 👍 2 🔁 0 💬 0 📌 0
The Silent Threat: How Unclaimed Subdomains Can Lead to Catastrophic Takeovers Introduction: Subdomain takeover vulnerabilities represent a critical yet often overlooked attack vector in modern cybersecurity. When a company points a subdomain to a third-party service like Softr, Vercel, or AWS but later abandons that service, the DNS record remains, creating a dangerous window of opportunity for attackers. This article provides a technical deep dive into identifying, exploiting, and mitigating these pervasive threats.

The Silent Threat: How Unclaimed Subdomains Can Lead to Catastrophic Takeovers

Introduction: Subdomain takeover vulnerabilities represent a critical yet often overlooked attack vector in modern cybersecurity. When a company points a subdomain to a third-party service like Softr, Vercel, or AWS but…

07.09.2025 13:23 👍 4 🔁 1 💬 0 📌 0
Preview
Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware Silver Fox exploited a Microsoft-signed WatchDog driver in May 2025 to bypass defenses, deploy ValleyRAT, and enable fraud.

The threat actor Silver Fox exploited a previously unknown vulnerable driver linked to WatchDog Anti-malware in a BYOVD attack, disabling security solutions on compromised hosts.

05.09.2025 15:57 👍 1 🔁 0 💬 0 📌 0
Preview
Disney to Pay $10 Million for Collecting Children’s Data on YouTube Disney has agreed to a $10 million civil penalty for failing to designate videos from 'Coco,' 'The Incredibles' and 'Frozen' as 'made for kids.'

FTC complaint claims that Disney did not label specific YouTube videos as intended for children when uploading them to the platform. This oversight led to those videos being subjected to online advertising.

04.09.2025 19:22 👍 1 🔁 0 💬 0 📌 0
Preview
Jaguar Land Rover says cyberattack ‘severely disrupted’ production Jaguar Land Rover (JLR) announced that a cyberattack forced the company to shut down certain systems as part of the mitigation effort.

"Jaguar Land Rover says cyberattack ‘severely disrupted’ production"

03.09.2025 21:32 👍 0 🔁 0 💬 0 📌 0
Post image

I was once reported to HR for threatening to commit Office Space-style violence against a Citrix cluster. It resulted in a formal meeting with my manager (where we both had a good laugh).

Just a reminder that not everyone sees things as (funny) as you do!

27.08.2025 19:20 👍 2 🔁 0 💬 0 📌 0

"Using This Domain (onmicrosoft.com)? Microsoft Will Soon Restrict Your Emails"
www.pcmag.com/news/u...

26.08.2025 19:55 👍 0 🔁 0 💬 0 📌 0
Preview
US charges Oregon man in vast botnet-for-hire operation Federal prosecutors called Rapper Bot one of the most powerful DDoS botnets in history.

"US charges Oregon man in vast botnet-for-hire operation"

25.08.2025 21:19 👍 0 🔁 0 💬 0 📌 0
Preview
Microsoft blames configuration change for another 365 outage : What testing is happening before changes hit production?

Always have a rollback plan. It should be more detailed than "Ctrl-Z" so that others can understand what you did and reverse it, if necessary.

23.08.2025 19:14 👍 1 🔁 0 💬 0 📌 0
Preview
Apple fixes new zero-day flaw exploited in targeted attacks Apple has released emergency updates to patch another zero-day vulnerability that was exploited in an "extremely sophisticated attack."

Another reminder that having an Apple device does not make you impervious to attack. Patch 'em if you got 'em!

22.08.2025 23:39 👍 0 🔁 0 💬 0 📌 0
Preview
25% of security leaders replaced after ransomware attack In a perfect world, such things would happen only when the CISO made explicit errors. In the corporate world, though, scapegoating is tradition.

I'm surprised it was that low. I estimate closer to 40-50 percent.

19.08.2025 19:49 👍 0 🔁 0 💬 0 📌 0
Preview
Workday Breach Linked to ShinyHunters Salesforce Attacks The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only "commonly available" business contact info was e...

The HR giant said hackers mounted a socially engineered cyberattack on its third-party CRM system but did not gain access to customer information; only "commonly available" business contact info was exposed. www.darkreading.com/application-...

19.08.2025 11:53 👍 0 🔁 1 💬 0 📌 0

Ugh, a quintet of hooded hackers!

19.08.2025 12:29 👍 0 🔁 0 💬 0 📌 0

Myth: Macs can't get viruses. 🚫🦠 Truth: While they're less targeted, Macs can still fall victim to malware! Stay vigilant, everyone! #CyberMyths

19.08.2025 12:10 👍 2 🔁 1 💬 1 📌 0