Jeff W.
banner
southlakecyber.bsky.social
Jeff W.
@southlakecyber.bsky.social
130 followers 160 following 690 posts
Musings around Cybersecurity | Governance | Risk | Privacy | Compliance | Audit
Posts Media Videos Starter Packs
Time's up! ⏰

Upgrade to Windows 11 (if your PC supports it), purchase a new device with Windows 11 or another OS, or enroll in the Extended Security Updates (ESU) program for one more year of updates.
www.engadget.com/com...
A newly observed Astaroth banking trojan campaign leverages GitHub to keep its operations running even when traditional command-and-control infrastructure is disrupted.
Astaroth Banking Trojan Abuses GitHub to Remain Operational After Takedowns
Astaroth banking trojan exploits GitHub for resilience, targeting Latin American users via phishing.
thehackernews.com
Recovery Time Objective and Maximum Tolerable Downtime are often confused. Here's a great example where I'm sure the RTO was hours (or less) and the MTD is apparently weeks - however the question of JLRs future viability is still unanswered.
Jaguar Land Rover shutdown extended again after cyber attack
The business secretary will also meet suppliers of the car maker who are at risk of closure.
www.bbc.com
Yes, Virginia. Security IS hard.
Few clients I encounter have implemented baseline configs and hardening, yet these are essential. Combine with vuln scans and periodic pentests, and you create a stronger and more secure foundation.
The Silent Threat: How Misconfigurations Fuel the Cyber Crime Economy
Billions of records are breached each year as a result of misconfigured servers, firewalls and other network devices. What can be done? Let’s explore.
www.govtech.com
Check out Offensive Countermeasures: The Art of Active Defense by John Strand if you're interested in more information on the topic.
🥇“We are now in recovery . . . Our approach is deliberate, prioritized, and secure: systems are brought back only after testing and validation, with priority given to those essential for public safety, financial stability, and daily operations.”
St. Paul, Minn., Systems Come Back Online After Cyber Attack
The city is gradually restoring online services after a ransomware attack in July interrupted them. Phone service, online water bill payments, and Parks and Recreation payment systems are among those restored.
www.govtech.com
Great summary of some often-forgotten information security controls. Partnering with your facilities team is the best way to ensure you can be successful.
The threat actor Silver Fox exploited a previously unknown vulnerable driver linked to WatchDog Anti-malware in a BYOVD attack, disabling security solutions on compromised hosts.
Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware
Silver Fox exploited a Microsoft-signed WatchDog driver in May 2025 to bypass defenses, deploy ValleyRAT, and enable fraud.
thehackernews.com
FTC complaint claims that Disney did not label specific YouTube videos as intended for children when uploading them to the platform. This oversight led to those videos being subjected to online advertising.
Disney to Pay $10 Million for Collecting Children’s Data on YouTube
Disney has agreed to a $10 million civil penalty for failing to designate videos from 'Coco,' 'The Incredibles' and 'Frozen' as 'made for kids.'
variety.com
I was once reported to HR for threatening to commit Office Space-style violence against a Citrix cluster. It resulted in a formal meeting with my manager (where we both had a good laugh).

Just a reminder that not everyone sees things as (funny) as you do!
"Using This Domain (onmicrosoft.com)? Microsoft Will Soon Restrict Your Emails"
www.pcmag.com/news/u...
Always have a rollback plan. It should be more detailed than "Ctrl-Z" so that others can understand what you did and reverse it, if necessary.
Microsoft blames configuration change for another 365 outage
: What testing is happening before changes hit production?
www.theregister.com