Posts

Showing posts from July, 2025

Week 10: Cybercrime dilemma

Image
  Cybercrime—ranging from ransomware to online fraud—is inflicting hundreds of billions of dollars in losses across the U.S., threatening individuals, schools, businesses, utilities, and governments . Ransomware attacks on K–12 schools have disrupted instruction and cost districts up to $ 1 million, while the U.S. Marshals Service itself fell victim, its systems compromised and sensitive data accessed . Although federal agencies such as the FBI, Secret Service, and DEA deploy various tools—from public complaint portals to investigative databases—the lack of a uniform definition of “cybercrime” , the absence of a centralized federal data repository , and reluctance by victims (especially businesses) to report incidents—makes it impossible to grasp the full extent of the problem . To address these gaps, Congress enacted the Better Cybercrime Metrics Act in 2022, mandating the DOJ to create standardized categories of cybercrime and integrate them into the FBI’s National Incident...

Week 9: Vulnerability Management

Image
   Vulnerability management is a continuous process that identifies, evaluates, treats, and reports security vulnerabilities across systems and software. It helps reduce the attack surface and ensure compliance. The process includes asset discovery, vulnerability scanning, risk prioritization, remediation, and verification. Automation and risk-based tools enhance its efficiency, making it essential for modern cybersecurity strategies. Key Stages (Lifecycle) Asset Discovery Identify and catalog all IT assets—servers, endpoints, apps, networks—which forms the foundation for vulnerability scanning. Vulnerability Scanning Use automated tools to detect known flaws such as misconfigurations, open ports, and out-of-date software across the infrastructure . Prioritization & Risk Rating Assign risk levels (e.g., CVSS scores, severity ratings) based on likelihood, business impact, exploitability, and compliance requirements .. Remediation & Mitigation Apply patches,...

Week 8: Identity-based Attacks Breaching Retail

Image
  Exploiting Third‑Party Trust (Adidas) Attackers gained access through a vendor’s SaaS integration using stale tokens/service accounts that lacked MFA or expiration. This supply-chain style breach exposed customer data without any malware—just unchecked trust in third parties   Credential Stuffing & Privilege Abuse (The North Face) Using leaked username/password combos, attackers accessed customer accounts via credential stuffing. With no MFA protection, they quietly extracted PII—demonstrating how weak identity hygiene opens doors.    SIM Swapping & Social Engineering (Marks & Spencer, Co‑op) Threat group Scattered Spider tricked help desk staff using SIM swap and impersonation, resetting MFA and password protections. This kind of human-layer trickery granted lateral access through overprivileged or dormant SaaS identities   Hijacked Unmonitored SaaS Admins (Victoria’s Secret) Although details are sparse, attackers likely targeted high-pr...

Week 7: Data Privacy

Image
    What Is Data Privacy? 1. Defining Privacy & Data Privacy Privacy is the fundamental right to keep your personal life and information to yourself. Data privacy specifically focuses on protecting your digital personal data—like your name, birthdate, online activity, medical info, and financial details—from unwanted access or sharing 2. Why It Matters in the Digital Age Vast volumes of data are generated whenever you go online—your web behavior, purchases, and even the time spent on a page. Companies analyze this data to personalize ads, predict behavior, and make decisions—but it also means your every action becomes part of a digital footprint   3. Data Privacy vs. Cybersecurity Cybersecurity is about protecting data from unauthorized intrusions, like hacks or malware. Data privacy is about your rights and choices—deciding who gets access to your information and what they can do with it .  Data privacy is all about making informed choices and ...