William Tsing

Breaking things and wrecking up the place since 2005.

November 26, 2019 - We’ve covered sextortion before, focusing in on how the core of the threat is an exercise in trust. The threat actor behind the campaign will use whatever information available on the target that causes them to trust that the threat actor does indeed have incriminating information on them. (They don’t.) But as public awareness of...

CONTINUE READINGNo Comments

October 11, 2019 - Managed service providers (MSPs) have become the target of attacks, as lack of aggressive security posturing has left them—and the high-value data of their clients—vulnerable. Learn how MSPs can secure against a rising tide of threats.

CONTINUE READINGNo Comments

September 9, 2019 - Before organizations engage in gnashing of teeth over the "ignorant user" and the cost of training, think about how much email users encounter and whether corporate communications look like phishes themselves.

CONTINUE READINGNo Comments

July 10, 2019 - As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

CONTINUE READINGNo Comments

April 29, 2019 - Users reported that Wall Street Market, a broadly-known cryptocurrency dark net market, has executed an exit scam, swindling millions from account holders in the process.

CONTINUE READINGNo Comments

Select your language