Security Firm @SophosXOps published another report, this one on incidents at small and medium-sized businesses by @thepacketrat and Anna Szalay. One of the things I always look for in these reports are easy #cybersecurity wins -- and this report has a bunch of them.
First off - take a look at this chart: Top 15 dual-use tools. Imagine the pain you can cause threat actors by blocking the use of these tools and disrupting their playbooks!
For #cybersecurity experts, that spike in #data leaving the system is a key indicator of a #breach, Berulis explained.
When Berulis asked his IT colleagues whether they knew why the data was exfiltrated or whether anyone else had been using containers to run code on the system in recent weeks, no one knew anything about it or the other unusual activities on the network….
Russ Handorf, who served in the #FBI for a decade in various #cybersecurity roles, also reviewed Berulis' extensive technical forensic records & analysis….
"All of this is alarming," he said. "If this was a publicly traded company, I would have to report this [breach] to the Securities and Exchange Commission…."
In the very last minute, CISA extends funding to ensure 'no lapse in critical CVE services' for the next 11 months. Potential catastrophe of epic proportions averted....for now.
The CVE program going away is the least of my worries. Not saying it's not important, it absolutely is. But compared to secret police and concentration camps it's nothing.
Outstanding and alarming reporting by @npr here on what appears to be major violations of security and data privacy protocol by the DOGE folks on National Labor Relations Board Data. Big props to the brave whistleblower, Daniel Berulis, who has come forward despite receiving threatening notes with personal information and pictures taken from overhead (drones?) of him walking his dog. https://www.npr.org/2025/04/15/nx-s1-5355896/doge-nlrb-elon-musk-spacex-security #cybersecurity#doge#privacy
This is a huge must-read on a brave whistleblower revealing DOGE staff disabling monitoring tools, deleted logs, and even one staffer tried to log in via a Russian IP address.
& data has nothing to do w/making the govt more efficient or cutting spending.
Meanwhile, acc/to the disclosure & records of internal comms, members of the #DOGE team asked that their activities not be logged on the system & then appeared to try to cover their tracks behind them, turning off monitoring tools & manually deleting records of their access—evasive behavior several #cybersecurity experts compared to what #criminal or #StateSponsored#hackers might do.
The #whistleblower's account is corroborated by internal documentation & was reviewed by 11 technical experts across other govt agencies & the private sector. In total, NPR spoke to >30 sources across govt, private sector, #labor movement, #cybersecurity & #law enforcement who had their own concerns about how #DOGE & the #Trump admin might be handling sensitive #data, & the implications for its exposure. The following account comes from the whistleblower's ofcl disclosure & interviews w/ #NPR.
For #cybersecurity professionals, a failure to log activity is a cardinal sin & contradicts best practices as recommended by the National Institute of Standards & Technology [#NIST] & the #DHS's #CISA, as well as the #FBI & the #NSA.
"That was a huge red flag," said Berulis. "That's something that you just don't do. It violates every core concept of security & best practice."