Yes, here it is; that “end of year, look back at what happened, and what’s coming next” type post.
I am not one for reminiscing, but there have been a few big stories during the past year.
Some might still be raw and top-of-mind (…Log4J), pushing the other big cyber security events last year to the back our minds.
Here is a month-by-month breakdown of posts I’ve bookmarked in Obstracts;
CrowdStrike Services Cyber Front Lines Report by Crowdstrike
Sandworm intrusion set campaign targeting Centreon systems by Agence Nationale de la Securite des Systemes d’Information
Intelligence Community Assessment: Foreign Threats to the 2020 US Federal Elections (Declassified) by the National Intelligence Council
Welcome to the 2021 Threat Detection Report by Red Canary
2021 Data Breach Investigations Report by the Verizon DBIR team
Red Canary’s Diary of a Detection Engineer 1/3 by Red Canary
How ransomware happens and how to stop it by the NZ Cert.
Group-IB founder arrested in Moscow on state treason charges by The Record (by Recorded Future)
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor by the Microsoft Threat Intelligence Center
Evolving trends in Iranian threat actor activity by the Microsoft Threat Intelligence Center
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution by Google Project Zero.
I deliberately chose a non Log4J subject for December. Here’s a good roundup of blog posts on the topic.
See you in a years time for another one of these!
Join the Signals Corps on Discord
Join our public community of intelligence analysts and researchers sharing new content hourly.
Turn any blog into structured threat intelligence.
Extract machine readable intelligence from unstructured data.
Know when software you use is vulnerable, how it is being exploited, and how to detect an attack.
View, modify, and deploy SIEM rules for threat hunting.