Newsletter

10.01.2021 | 4'' read

Information brokerage and cyber storytelling

by Ryan Naraine

* The most clicked link from last week’s newsletter was Kim Zetter’s interview with David Evenden, a former NSA hacker who was recruited to Abu Dhabi to do cybersecurity work, only to realize he had been deceived and he was actually lured there to hack for the UAE government.

Notes.
  • We have some open advertising slots for the newsletter and podcast.  Contact me to discuss a smarter approach to telling your story to security practitioners.
  • I’m planning to be in Atlanta October 25-28 to speak at this year’s hybrid ICS Cyber Security Conference. Let’s grab coffee if you’re in town. (Twitter DMs are open).

Monday blues. 

High-end APT research is big business. From private reports to subscription feeds and data-bartering partnerships, companies old and new and cashing in.  As JAG-S noted back in 2015, this means that the traditional malware researcher is now an “intelligence broker” operating in an oft-misunderstood space with geopolitical weight and consequences.

Imagine my twitching eyebrows when I read this wild Yahoo News piece on CIA’s secret war against Wikileaks, a story centered around the government’s use of the “information brokers” tag to raise the temperature on outside scrutineers. Regardless of your stance on Wikileaks or who is or isn’t a journalist, this is bone-chilling stuff that soon start touching parts of our industry.

Researchers, it’s imperative you begin to understand the nuances of your business and consider pushing back against aggressive demands from your marketing team.  Eyes wide open, everyone.

_ryan

On to the newsletter…

The big APT stories

There’s a handful of significant APT stories worth your attention:


Advertisement — Symmetry Systems.

Using Symmetry DataGuard, cloud-security teams tighten IAM policies around data, incident response teams know precisely what data objects are involved in a breach, and governance teams audit every access across every data store. Get in touch today for a demo.


Apple in another public pickle

It seems we cant go a few days without a new Apple self-inflicted security scandal.  On the heels of the CSAM embarrassment, the nonstop 0day exploits and signs of iOS security patch withholding, we now have legit anger from well-meaning security researchers who feel manipulated and abused by Apple’s bug bounty program.Some of the newest examples:

High-alert bugs.

Security responders, pay attention to these high-priority items:

Leftovers.

Tangentially.

P.S. Full podcast episodes are available on the SecurityConversations.com home page, and on all major platforms. Subscribe directly: Apple/iPhoneGoogle/AndroidSpotify and Amazon/Audible.

|

This site uses cookies and may process personal data based on our Privacy Policy