Newsletter Subject

Clop - What you need to know

From

packtpub.com

Email Address

austinm@packtpub.com

Sent On

Fri, Jun 23, 2023 01:18 PM

Email Preheader Text

Plus news, articles, breakdowns, and a few other little insights for you... SecPro #106: Clop - What

Plus news, articles, breakdowns, and a few other little insights for you... [View this email in your browser]( SecPro #106: Clop - What You Need To Know. Hello! As confusion around the Clop threat actor group only seems to grow with each passing day, we thought it was time to investigate what exactly has happened over the past few weeks. But before we dive into a deep analysis of what exactly is happening with Clop, we thought we'd set the scene. That's why we've got an introduction to Clop and another chance to check out our featured guest article from last week! Thanks to everyone who responded to our interview survey. It is now closed, so we're sorry if you missed out. Free eBooks and interview invitations will be finalised before 30th June - don't worry, we've got your back! Cheers! [Austin Miller]( Editor in Chief This week's highlights: - [Protecting Your Identity with a Zero-Trust Mindset]( - [Clop - What You Need to Know]( - [ThreatGEN Tutorial - Learn ICS skills with Clint!]( - [Cybersecurity Career Master Plan]( And with that - on with the show! [_secpro]( [Packt _secpro Newsletter]( [The _secpro Website]( Improve you skills through a simulation This week, the _secpro team took some time to catch up with author and ICS expert, Clint Bodungen. Although we're going to keep a few secrets from you, our dear readers, we've decided to share a little treatment from one of Clint's projects - [ThreatGEN](. Want to learn a little bit about how a game can help you improve you skills? [Click the video above]( This Week's Editorial Articles [Protecting your identity with a zero-trust mindset]( [Protecting Your Identity with a Zero-Trust Mindset]( We've all heard about zero trust. You might have even implemented a few zero-trust measures in your workplace (or home network!), but what does it mean to have a "zero-trust mindset"? [Mark Dunkerley]( guides us through getting our head right before making changes. [Clop - What You Need To Know]( We've investigated what we know about this threat actor group. Check the _secpro next week for a deep dive into their MOVEit malware! What's Going on in the World of Security? Since the world of security is always changing, keeping up with blogs, insights, and other updates is almost half the job. That's why we've collected some recent blog posts from our favorite cybersecurity "talking heads" to give you a helping hand. - [Krebs on Security]( - [SMS Phishers Harvested Phone Numbers, Shipment Data from UPS Tracking Tool]( The United Parcel Service (UPS) says fraudsters have been harvesting phone numbers and other information from its online shipment tracking tool in Canada to send highly targeted SMS phishing (a.k.a. “smishing”) messages that spoofed UPS and other top brands. - [Bruce Schneier]( - [AI as Sensemaking for Public Comments]( It’s become fashionable to think of artificial intelligence as an inherently [dehumanizing technology]( a ruthless [force of automation]( that has unleashed legions of virtual skilled laborers in faceless form. But what if AI turns out to be the one tool able to identify what makes your ideas special, recognizing your unique perspective and potential on the issues where it matters most? - [Bruce Schneier]( - [Ethical Problems in Computer Security]( Tadayoshi Kohno, Yasemin Acar, and Wulf Loh wrote an excellent paper on ethical thinking within the computer security community: “[Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversation](. - [Security Affairs]( - [More than a million GitHub repositories potentially vulnerable to RepoJacking]( Researchers reported that millions of GitHub repositories are likely vulnerable to an attack called RepoJacking. - [Daniel Miessler]( - [Human Immortality Using LLMs?]( I’ve [been thinking]( about digital immortality for a long time before GPTs and LLMs became a thing. Back when I wrote [this piece]( I am pretty sure I was thinking of something able to extract and emulate the brain by interfacing with the biology itself. But that still seems very far off. - [Troy Hunt]( - [Weekly Update 352]( "Domain searches in HIBP - that's the story this week - and I'm grateful for all the feedback I've received. I've had a few messages in particular since this live stream where people gave me some really excellent feedback to the point where I've now got a much clearer plan in my head as to what this will look like." Cybersecurity Fundamentals Thanks to everyone who voted last week! We are starting a ten-week breakdown on a selection of excerpts from... (Imagine a drumroll here.) Cybersecurity Master Career Plan! So, without any further delay, here's our first piece of advice from some people who have seen it all. [LIKE THIS? READ IT ALL HERE]( Working in the public sector versus the private sector We spent some time earlier talking about working for the government, specifically, we went into the federal government in depth because of all the cybersecurity requirements outlined there through FISMA and other initiatives. It's important to call out here working in the public sector, which would be the government, versus working in the private sector, which would be with private businesses and vendors. Some of the interesting things from a cybersecurity professional perspective is when you work in the public sector, you typically get lower salaries, and you are not authorized to accept gifts from vendors (such as tickets to shows, meals, travel to vendor conferences, golf outings, and so on). Also, you may find yourself pigeonholed in your job with certain roles and responsibilities, not being able to get exposure to other areas of the field Public sector jobs are more stable. The government occasionally does furlough staff during government shutdown events, but for the most part, there is very little concern about losing your job in a government position. Also, the United States federal government (and some state governments) offers pension programs to incentivize their staff to stay. Pensions are a guaranteed retirement compensation plan heavily based on years of service. It's not uncommon for individuals to retire from their public sector job having hit their maximum years of commitment for a full retirement pension and start the next day as a contractor doing the same job. This is called double-dipping and is completely legitimate as the person then receives their pension and their contractor paycheck. This financial and job stability afforded by public sector jobs can be quite appealing to many people. The private sector has fewer constraints than the public sector regarding vendor gifts. Within the private sector, you can accept gifts from vendors if it's in line with your corporate policy. This will typically manifest in a vendor sending you tickets to an event, such as a security conference. If you have purchasing authority, they might send you clothes with the vendor logo on it, such as a pullover or a polo shirt. At conferences, you'll be invited to private parties with free food and drinks. It is worth noting that a company could have an internal policy not authorizing this, but it would be explicitly by having it as opposed to the public sector, in which it applies to all civilian and military personnel. Why would the vendor fly me to a conference, feed me great food and drinks, and hook me up with sweet gear? The idea behind this is that the vendor is hoping that by essentially giving you gifts, you're more likely to give them your time to listen to their pitch or potentially feel obligated to move forward with a proof of concept or purchasing their solution. This is proven psychology and is a highly effective form of marketing based on social exchange theory. In general, the private sector typically pays higher salaries. One study from 2013 quantified this discrepancy as private sector personnel making on average 35.2% more than their public sector counterparts. This data is a few years old, but anecdotally the private sector has better-paid jobs over comparable jobs in the public sector. It's worth noting that in 2019, the Department of Homeland Security (DHS) was empowered by Congress to enact civil service reform to adjust this discrepancy in some capacity (and to adjust minimum education requirements) to retain existing talent and attract talent from the private sector. You may be asking yourself Why wouldn't I choose free stuff, better pay, and lateral career growth? and it would be a fair question. The public sector does have its advantages. Within the public sector, you can typically say that job stability is higher. The government is unlikely to lay off staff or fire staff in general. Contrast that with the private sector, which is full of revenue-driven businesses. The business may be acquired or merged with another business resulting in redundancy layoffs. Another reality is you could be laid off because the acquiring company just wanted to buy the property rights, not the people, to the intellectual property of whatever great product you were securing for your company. In the federal public sector, the expectations are defined, and compliance is expected. Security tends to be funded and job roles are very compartmentalized. The expectation is a risk-based approach, but the reality is very framework adherence motivated. The private sector is very different, tending to be much more risk-based. You have to show the monetary value of security to the business. Often you have to convince leadership that the money spent will result in an acceptable level of risk. It seems like a subtle shift but is very impactful on your job and skillset. Things happen, so the private sector has a little bit more volatility around the security of your job. Currently, there are a lot of unfilled jobs in cybersecurity so finding another job if you are a casualty of a layoff (through no fault of your own!) is not impossible. Much like cybersecurity risk management, you must weigh the risks involved, how you might mitigate the risks to acceptable levels, and move forward with a decision. Do you see how I just related you choosing public versus private to a fundamental cybersecurity concept? Yes, I love cybersecurity. The public sector does have fringe benefits to sweeten the deal. Fringe benefits means non-salary compensation and opportunities. Some examples of these benefits include training dollars, the ability to travel to conferences, and pension plans. The work you do in a public sector job is well-defined and it's unlikely to receive "additional duties as deemed necessary," which is a way some private sector businesses define job roles so they can pile on more work outside your existing job. While not consistent across private sector businesses, some fringe benefits in the private sector can include performance bonuses. These bonuses are end-of-the-year financial payouts based on company performance. There may also be profit sharing or equity in the company offered as part of your compensation package. This is seen quite regularly in private sector companies. You will never see performance bonuses in the public sector. Have You Tried...? This week, we looked at Clop. That's why it only makes sense to give you a few ransomware-related tools to play with. Ready? Have fun. - [lowmoon/Detect-Crypto]( - A tool for automating FSRM deployment to defend against ransomware. - [DFIRobin/rvaccine]( - When you need a vaccine for ransomware, but without the overhead. - [werdnatreborp/mbrwlogger]( - An anti-ransomware activity logger. - [vaibhavb/box-ransomware-tools]( - Some CL tools for dealing with ransomware. - [mjwhitta/ransimware]( - A ransomware behaviour and techniques simulator - perfect for training. - [billiegoose/ransomAware]( - A tool that tells you when there's ransomware on the network. Simple. [FORWARDED THIS EMAIL? SIGN UP HERE]( [NOT FOR YOU? UNSUBSCRIBE HERE]( Copyright © 2023 Packt Publishing, All rights reserved. As a GDPR-compliant company, we want you to know why you’re getting this email. The _secpro team, as a part of Packt Publishing, believes that you have a legitimate interest in our newsletter and the products associated with it. Our research shows that you opted-in for communication with Packt Publishing in the past and we think that your previous interest warrants our appropriate communication. If you do not feel that you should have received this or are no longer interested in _secpro, you can opt out of our emails using the unsubscribe link below. Our mailing address is: Packt Publishing Livery Place, 35 Livery StreetBirmingham, West Midlands, B3 2PB United Kingdom [Add us to your address book]( Want to change how you receive these emails? You can [update your preferences]( or [unsubscribe from this list](.

EDM Keywords (238)

years wrote would worry world workplace working work without went weeks week way wanted want view video vendors vendor vaccine updates update unsubscribe unlikely uncommon tried travel tool time tickets thought thinking think tells sweeten story starting start staff stable spent sorry solution skills simulation show share set service sensemaking selection seen seems see security securing secrets secpro scene risks risk retire result responsibilities responded related receives received receive reality ready read ransomware purchasing pullover proof preferences potential point play pitch pile pigeonholed piece person people pension past part opted opt opposed opportunities one newsletter need much missed millions might messages merged mean may matters makes lot losing looked listen list line likely like learn layoff lay laid know keep job issues invited investigated investigate introduction interfacing initiatives information individuals incentivize improve important impactful imagine identity identify hoping hook hit higher hibp help heard head happening happened grow grateful gpts government got going give gifts getting general game funded full fisma financial finalised feel feedback fault far extract explicitly expectations expectation excerpts examples exactly everyone event equity end emulate empowered emails email drumroll drinks dive discrepancy depth department delay defined defend decision decided dealing data cybersecurity could contractor congress conferences concept compliance compartmentalized company communication commitment collected clothes closed clop clint civilian chief check change catch casualty capacity canada call buy brain bonuses biology automation authorizing authorized author asking areas applies anecdotally also advice adjust acquired able ability 2019

Marketing emails from packtpub.com

View More
Sent On

31/05/2024

Sent On

30/05/2024

Sent On

28/05/2024

Sent On

23/05/2024

Sent On

08/04/2024

Sent On

03/04/2024

Email Content Statistics

Subscribe Now

Subject Line Length

Data shows that subject lines with 6 to 10 words generated 21 percent higher open rate.

Subscribe Now

Average in this category

Subscribe Now

Number of Words

The more words in the content, the more time the user will need to spend reading. Get straight to the point with catchy short phrases and interesting photos and graphics.

Subscribe Now

Average in this category

Subscribe Now

Number of Images

More images or large images might cause the email to load slower. Aim for a balance of words and images.

Subscribe Now

Average in this category

Subscribe Now

Time to Read

Longer reading time requires more attention and patience from users. Aim for short phrases and catchy keywords.

Subscribe Now

Average in this category

Subscribe Now

Predicted open rate

Subscribe Now

Spam Score

Spam score is determined by a large number of checks performed on the content of the email. For the best delivery results, it is advised to lower your spam score as much as possible.

Subscribe Now

Flesch reading score

Flesch reading score measures how complex a text is. The lower the score, the more difficult the text is to read. The Flesch readability score uses the average length of your sentences (measured by the number of words) and the average number of syllables per word in an equation to calculate the reading ease. Text with a very high Flesch reading ease score (about 100) is straightforward and easy to read, with short sentences and no words of more than two syllables. Usually, a reading ease score of 60-70 is considered acceptable/normal for web copy.

Subscribe Now

Technologies

What powers this email? Every email we receive is parsed to determine the sending ESP and any additional email technologies used.

Subscribe Now

Email Size (not include images)

Font Used

No. Font Name
Subscribe Now

Copyright © 2019–2024 SimilarMail.