<?xml version="1.0" encoding="UTF-8"?>
<!--Generated by Site-Server v@build.version@ (http://www.squarespace.com) on Wed, 22 Apr 2026 09:31:02 GMT
--><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://www.rssboard.org/media-rss" version="2.0"><channel><title>Between The Hacks</title><link>https://www.betweenthehacks.com/</link><lastBuildDate>Wed, 15 Apr 2026 18:34:12 +0000</lastBuildDate><language>en-US</language><generator>Site-Server v@build.version@ (http://www.squarespace.com)</generator><description><![CDATA[<p>A Cybersecurity Blog</p>]]></description><item><title>How to Prioritize Vulnerability Remediation (Without Losing Your Mind)</title><category>Vulnerabilties</category><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 10 Feb 2026 03:27:29 +0000</pubDate><link>https://www.betweenthehacks.com/blog/vulnerability-prioritization</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:6803be6557688d0c3e9f4c3b</guid><description><![CDATA[Running a vulnerability scan is easy. Treating every finding as urgent is 
not. This model helps teams prioritize real risk instead of chasing 
severity scores.]]></description><content:encoded><![CDATA[<p class="">Let’s say you run a vulnerability scan and it finds 100 issues across your environment.</p><ul data-rte-list="default"><li><p class="">Ten are labeled <strong>critical</strong></p></li><li><p class="">Fifteen are <strong>high</strong></p></li><li><p class="">Twenty are <strong>medium</strong></p></li><li><p class="">The rest are <strong>low</strong> or <strong>informational</strong></p></li></ul><p class="">The report helpfully tells you to fix everything immediately.</p><p class="">This is where reality kicks in.</p><p class="">Most organizations cannot patch every vulnerability the moment it is discovered. Resources are finite. Systems cannot always be rebooted. Business operations still matter. In practice, this leads many teams to prioritize vulnerabilities strictly by severity. Critical first. Then high. Then medium.</p><p class="">That approach feels rational, but it often misses real risk.</p><p class="">So how do you actually prioritize?</p><p class="">The answer starts by moving beyond severity scores and focusing on real-world risk.</p><h2><strong>Start With Exposure</strong></h2><p class="">Vulnerability severity, including CVSS scores, provides a rough indicator. It does not tell the whole story.</p><p class="">A medium-severity vulnerability on an Internet-facing system is often more dangerous than a critical vulnerability buried inside a segmented lab environment.</p><p class="">Start triage by looking at exposure.</p><p class=""><strong>Internet-facing systems</strong></p><p class="">If a system is reachable from the Internet, it should always be near the top of the list. Public exposure means attacker exposure.</p><p class=""><strong>Internal systems with broad access</strong></p><p class="">Shared file servers, identity systems, and intranet applications. If many users can access it, it can quickly become a launchpad for lateral movement.</p><p class=""><strong>Systems with sensitive data</strong></p><p class="">Even with limited exposure, the impact of compromise can be severe. Think HR systems, financial platforms, R&amp;D environments, or regulated data stores.</p><p class="">Exposure often matters more than severity.</p><h2><strong>Use the KEV List. It’s There for a Reason</strong></h2><p class="">The Cybersecurity and Infrastructure Security Agency maintains the <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog" target="_blank">Known Exploited Vulnerabilities (KEV) catalog</a>. This list identifies vulnerabilities that are actively being exploited in the wild.</p><p class="">If a vulnerability appears on the KEV list, it should be treated as urgent.</p><p class="">Patch it.</p><p class="">Mitigate it.</p><p class="">Isolate it.</p><p class="">Do not debate the CVSS score.</p><blockquote><p class="">Adversaries do not rely on critical vulnerabilities alone. They exploit what is available, which is often what is left unpatched.</p></blockquote><p class="">Attackers follow opportunity, not scoring systems.</p><h2><strong>Stop Thinking in Terms of Just CVSS</strong></h2><p class="">CVSS scores are theoretical. Attackers are not.</p><p class="">Many real-world intrusions begin with medium-severity vulnerabilities that are chained together. At the same time, some critical CVEs have never been exploited at all.</p><p class="">Instead of asking only “How severe is this?”, ask better questions:</p><ul data-rte-list="default"><li><p class="">Is it being actively exploited?</p></li><li><p class="">Is it exposed?</p></li><li><p class="">What is the impact if it is compromised?</p></li></ul><p class="">Risk lives at the intersection of exposure, exploitability, and impact.</p><h2><strong>A Practical Prioritization Model</strong></h2><p class="">Here is a simple structure that blends exposure, KEV status, and severity into something teams can actually act on.</p><p class="">In this model, <strong>sensitive data</strong> refers to vulnerabilities on systems that store or process sensitive information. <strong>Sensitive network segments</strong> refer to vulnerabilities on systems whose network position enables broader access or lateral movement.</p>





















  
  




  
    <table>
  <thead>
    <tr>
      <th>Priority</th>
      <th>What It Means</th>
    </tr>
  </thead>
  <tbody>
    <tr>
      <td>P1</td>
      <td>
        Internet-facing system with a known exploited vulnerability (KEV), regardless of severity
      </td>
    </tr>
    <tr>
      <td>P2</td>
      <td>
        Internet-facing system without a KEV, but with critical, high, or medium severity findings
      </td>
    </tr>
    <tr>
      <td>P3</td>
      <td>
        Internal system containing sensitive data with a known exploited vulnerability (KEV)
      </td>
    </tr>
    <tr>
      <td>P4</td>
      <td>
        Internal system in a sensitive network segment without known exploitation
      </td>
    </tr>
    <tr>
      <td>P5</td>
      <td>
        Internal system with limited access and a known exploited vulnerability (KEV)
      </td>
    </tr>
    <tr>
      <td>P6</td>
      <td>
        Any system without known exploitation and medium severity vulnerabilities
      </td>
    </tr>
    <tr>
      <td>P7</td>
      <td>
        Any system without known exploitation and low or informational findings
      </td>
    </tr>
    <tr>
      <td>P8</td>
      <td>
        No meaningful exploitability or risk. Informational noise.
      </td>
    </tr>
  </tbody>
</table>
  




  <h2><strong>Final Thoughts</strong></h2><p class="">Vulnerability management does not have to be overwhelming, but it does have to be intentional.</p><p class="">Focus on what actually matters:</p><ul data-rte-list="default"><li><p class="">What is exposed?</p></li><li><p class="">What is being exploited?</p></li><li><p class="">What creates real risk to the business?</p></li></ul><p class="">Patch with purpose.</p><p class="">Reduce noise.</p><p class="">And sleep better at night.</p><p class="">I will share more details on this approach in future posts. When I originally developed this model, I also built a set of simple prioritization calculators to help translate scanner output into actionable remediation tasks. The P1–P8 framework is a basic component of that work.</p><p class="">I will revisit those calculators, refine them, and share updated versions as part of a deeper series on practical vulnerability management. The goal is not more dashboards, but better decisions.</p><p class=""><em>Stay tuned.</em></p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1770693481524-0RJVZ0JDGKEMNSO2BD61/VulnMgtPrioritize.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">How to Prioritize Vulnerability Remediation (Without Losing Your Mind)</media:title></media:content></item><item><title>Don't Let Legacy Systems Write Your Headline</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 11 Nov 2025 02:07:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/louvre-legacy-systems</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:69128c501e891e6a292a63f8</guid><description><![CDATA[What came after a dramatic Louvre heist highlights the risks of leaving 
legacy technology untreated in your enterprise, and how to mitigate them 
before they make the news.]]></description><content:encoded><![CDATA[<p class="">You likely know about the jewels stolen from the Louvre where thieves used a truck-mounted lift to reach a balcony, cut through a window into the Apollo Gallery, grabbed roughly $100 million worth of crown jewels, and escaped on motor scooters. The entire heist took less than eight minutes. It played out like a Hollywood heist, but what came after revealed a real-world security lesson that every enterprise faces when old technology and slow upgrades linger too long.</p><p class="">What most people don’t know is what surfaced after the heist. Reports revealed both physical and technology weaknesses at the Louvre. The museum’s director told French senators that the only camera near the point of entry was pointed west and didn’t capture the balcony itself. <a href="https://www.wcvb.com/article/youll-never-guess-the-louvres-onetime-cctv-password/69276771">One report</a> noted that across 465 galleries, only 432 CCTV cameras were installed in 2024, leaving 61 percent of galleries either unmonitored or only partially covered.</p><p class=""><a href="https://www.tomshardware.com/tech-industry/cyber-security/louvre-heist-reveals-glaring-security-weaknesses-previous-reports-say-museum-used-louvre-as-password-for-its-video-surveillance-still-has-workstations-with-windows-2000">Investigations</a> also found that parts of the museum’s video surveillance system were obsolete and protected by the password “Louvre.” The museum’s automation network included computers still running <a href="https://www.tomshardware.com/tech-industry/cyber-security/louvre-heist-reveals-glaring-security-weaknesses-previous-reports-say-museum-used-louvre-as-password-for-its-video-surveillance-still-has-workstations-with-windows-2000">Windows 2000</a>, which Microsoft stopped supporting in 2010. French cybersecurity audits dating back to <a href="https://www.tomshardware.com/tech-industry/cyber-security/louvre-heist-reveals-glaring-security-weaknesses-previous-reports-say-museum-used-louvre-as-password-for-its-video-surveillance-still-has-workstations-with-windows-2000">2014</a> had already warned the museum about weak passwords, unsupported software, and aging infrastructure.</p><p class="">Nothing indicates that these technology weaknesses played a direct role in the theft, but together they show a pattern many organizations will recognize, known issues, postponed upgrades, and slow progress toward modernization.</p><p class="">It’s a good time to learn from their mistakes. Especially when it comes to managing legacy technology inside an enterprise.</p><p class=""><strong>The Real Problem with Legacy Systems</strong></p><p class="">Legacy systems don’t just exist in museums. They’re everywhere. The old file server no one wants to touch. The badge reader running on Windows XP. The cameras and lab devices that “still work fine.”</p><p class="">We all know why they linger:</p><ol data-rte-list="default"><li><p class="">They still work.</p></li><li><p class="">The vendor stopped supporting them.</p></li><li><p class="">They’re hard to isolate or replace.</p></li><li><p class="">They sit outside normal IT governance.</p></li><li><p class="">Audits identify them, but remediation gets deferred.</p></li></ol><p class="">That’s how risk quietly becomes accepted and forgotten.</p><p class=""><strong>How to Fix the Problem</strong></p><p class="">You can’t replace everything overnight, but you can manage legacy risk methodically. My approach is simple: <strong>Identify, Contain, Harden, Monitor, then Risk Register</strong>.</p><p class=""><strong>1. Identify</strong></p><p class="">Inventory every system in your enterprise and identify those that are unsupported, unpatchable, or unmanaged. Label them clearly. If a device still uses a default password or runs on an outdated OS, treat it as critical. You can’t protect what you haven’t found.</p><p class=""><strong>2. Contain</strong></p><p class="">Segment these systems on the network. Apply strict firewall rules that only allow necessary communication. Use a jump host or privileged-access tool for administration.</p><p class="">Even if your company hasn’t fully adopted Zero Trust, you can still apply some of its principles. Treat every device, user, and network as untrusted until verified. Apply least privilege and continuous validation.</p><p class=""><strong>3. Harden</strong></p><p class="">Lock down what you can. Disable unused services. Remove default accounts. Turn off legacy protocols. Apply host firewalls and configuration baselines. A well-hardened legacy system is safer than a modern one left wide open.</p><p class=""><strong>4. Monitor</strong></p><p class="">If a system can’t produce logs, monitor its network traffic. Watch authentication attempts, DNS lookups, and outbound connections. You can’t defend what you don’t see.</p><p class=""><strong>5. Risk Register: Retire, Replace, or Accept</strong></p><p class="">Every unsupported system or unresolved vulnerability belongs on a formal risk register. Each entry should include a clear description, an assigned owner, a target timeline, and an executive signature confirming awareness and acceptance. Review the register quarterly with leadership. For each item, decide whether to <strong>retire it</strong>, <strong>replace it</strong>, or <strong>accept it</strong>.</p><p class="">This process identifies business risk and assigns ownership to those who can fix or fund the solution. It also documents which executives have accepted the residual risk on behalf of the business. Most importantly, it keeps those risks visible. Regular executive review turns quiet technical debt into an informed business decision.</p><p class="">If the Louvre had used a process like this, an entry reading “obsolete camera system – accepted risk since 2014” would have stood out long before the headlines did.</p><p class=""><strong>Building Toward Zero Trust</strong></p><p class="">Even if your enterprise hasn’t officially adopted Zero Trust, you can start applying its core principles today. Zero Trust can seem abstract, but its fundamentals are simple.</p><ul data-rte-list="default"><li><p class="">Verify everything: Never assume internal systems or networks are safe.</p></li><li><p class="">Enforce least privilege: Users and systems should only access what they need.</p></li><li><p class="">Assume breach: Design your network and access models as if compromise has already occurred.</p></li></ul><p class="">Zero Trust doesn’t have to be an enterprise-wide initiative on day one. It can start with your legacy environments. The systems that can’t be patched or upgraded are the perfect place to prove the model works.</p><p class=""><strong>Summary</strong></p><p class="">Legacy systems are not just old technology. They are known risks that have been allowed to remain. The solution isn’t always to replace them immediately. It’s to isolate them, harden them, monitor their behavior, and document the risk. When combined with executive ownership, this approach creates a defensible, transparent, and continuously improving security posture.</p><p class="">Executives understand business risk more than they understand patching cycles. A technical vulnerability becomes a business issue the moment it impacts operations or reputation.</p><p class="">In many organizations, the list of legacy systems is already known. The challenge isn’t discovery, it’s accountability. A formal risk register with executive signatures changes the conversation from “we know” to “we decided.” That single shift transforms a reactive security program into a proactive one.</p><p class="">The Louvre’s story is dramatic, but the problem isn’t unique. Learn from it before your own legacy systems make the news.</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1762823256103-LSST1OS7SZM18SCD3F1R/LouvreLegacySystems.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Don't Let Legacy Systems Write Your Headline</media:title></media:content></item><item><title>Venmo Privacy Settings 2026: Make All Payments Private in 60 Seconds</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 28 Oct 2025 14:03:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/venmo-lockdown</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:68f44c3a0a800149eae6c6cc</guid><description><![CDATA[Step-by-step guide to changing your Venmo privacy settings, including how 
to make past transactions private and hide your public payment history. 
Updated for 2026.]]></description><content:encoded><![CDATA[<p class=""><em>Last Updated: February 2026</em></p><p class="">Venmo payments are public by default. Unless you adjust your privacy settings, your payment history is visible to others.</p><p class="">To make Venmo payments private, open the Venmo app, go to Settings → Privacy, set your Default Privacy Setting to Private, and change past transactions to private. It takes less than 60 seconds.</p><p class="">Most people never adjust the default visibility setting. As a result, their payment history becomes part of Venmo’s public social feed without them realizing it.</p><p class="">Imagine if your bank published a live feed showing who you paid, when, and why. It would feel absurd. Yet that’s essentially how Venmo works out of the box.</p><p class=""><strong>Sam paid Alex</strong> </p><p class="">🚗 Ride to the clinic 🏥</p><p class=""><strong>Pat paid Chris</strong></p><p class="">🤨 questionable decisions 💸</p><p class="">It sounds ridiculous, but that’s exactly what Venmo works out of the box.</p>





















  
  



<hr />


  <p class=""><strong>Quick Fix:</strong></p><ol data-rte-list="default"><li><p class="">Open Venmo → Settings → Privacy</p></li><li><p class="">Set Default Privacy to Private</p></li><li><p class="">Tap Past Transactions → Change All to Private</p></li></ol>





















  
  



<hr />


  <p class=""><strong>How to Make Venmo Payments Private in 60 Seconds</strong></p><p class="">Here’s how to lock down both your future and past Venmo activity:</p><h3><strong>1. Open the Venmo App</strong></h3><p class="">Make sure you’re logged in on your iPhone.</p><h3><strong>2. Tap the “Me” icon (lower right corner)</strong></h3><p class="">This opens your profile panel.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg" data-image-dimensions="1320x402" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=1000w" width="1320" height="402" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/f36bc5a5-38cd-4f42-b3a7-06983879f4a2/IMG_0232.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true">Venmo Profile icon</p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h3><strong>3. Select Settings (the gear in the upper right corner)</strong></h3>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg" data-image-dimensions="1320x222" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=1000w" width="1320" height="222" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/83db2e1f-ee4e-4fa5-bb25-21aa9ab48546/IMG_0231.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true">Venmo Settings icon</p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h3><strong>4. Tap Privacy</strong></h3>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg" data-image-dimensions="1320x1320" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=1000w" width="1320" height="1320" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/c5ef3b07-4cf5-4dea-bd21-fca2614b0ea0/IMG_0228.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true">Venmo Settings: Showing Privacy as an option</p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h3><strong>5. Set Your Default Privacy to “Private”</strong></h3><p class="">This will ensure that future payments are visible only to you and the recipient.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg" data-image-dimensions="1319x1565" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=1000w" width="1319" height="1565" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/cfd9ba68-ce32-4b05-bdce-3653959c6ed6/IMG_0227.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true">Venmo Privacy Settings: Shows Private as an option</p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h3><strong>6. Change Past Transactions to Private</strong></h3><p class="">Scroll down and tap:</p><p class=""><strong>Past Transactions &gt; Change All to Private</strong></p><p class="">You’ll be prompted to confirm. Once you do, your entire payment history will be made private.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg" data-image-dimensions="1320x2425" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=1000w" width="1320" height="2425" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9c884c7e-c287-492e-8f4b-9d68f29dbf08/IMG_0229.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true">Venmo Change All Transactions to Private option</p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h3><strong>Double-Check Your Feed</strong></h3><p class="">To confirm your changes:</p><ul data-rte-list="default"><li><p class="">Tap the “Me” tab in the app</p></li><li><p class="">Scroll through your transactions</p></li><li><p class="">Ensure none of your past payments show up with public visibility</p></li></ul>





















  
  



<hr />


  <h2><strong>What Does Venmo Share by Default?</strong></h2><p class="">If you’ve used Venmo, there’s a good chance that:</p><ul data-rte-list="default"><li><p class="">You didn’t realize your payment history is publicly visible</p></li><li><p class="">Your past payments are still viewable, even if you’ve changed your settings</p></li><li><p class="">You can see your friends’ payments, and they can see yours</p></li></ul><p class="">When you pay someone on Venmo, unless you’ve changed your privacy settings:</p><ul data-rte-list="default"><li><p class="">The payment note and recipient are visible to the public</p></li><li><p class="">The dollar amount is hidden, but context clues can reveal a lot</p></li><li><p class="">Anyone using Venmo can browse the public feed and make inferences about your social habits, spending behavior, and connections</p></li></ul><p class="">Journalists have used Venmo’s public feed to track high-profile individuals, including members of Congress.</p><h3><strong>This Isn’t Just a Quirky Social Feature. It’s a Privacy Problem.</strong></h3><p class="">Venmo’s default setting makes your payment history public, often without you even realizing it. While Venmo privacy settings can be changed in seconds, most users never adjust the default visibility setting. </p><p class="">Payment metadata tells a story.</p><p class="">Even if dollar amounts are hidden, transaction notes can reveal:</p><ul data-rte-list="default"><li><p class="">Medical visits</p></li><li><p class="">Travel plans</p></li><li><p class="">Relationship details</p></li><li><p class="">Social networks</p></li><li><p class="">Spending patterns</p></li></ul><p class="">In cybersecurity, we call this contextual exposure. Individually harmless data points can become powerful when aggregated.</p><p class="">Privacy is not paranoia. It’s basic hygiene.</p>





















  
  



<hr />


  <h2><strong>Share This With Friends and Family</strong></h2><p class="">Next time you see a friend publicly paying someone, let them know their Venmo is wide open.</p><p class="">Better yet, send them this article.</p><p class="">Venmo doesn’t make this obvious, and most people have no idea their history is on display. A 60-second privacy fix can go a long way.</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1772038820720-8D47WYYB560Z3V4KT0RL/VenmoPrivacy60seconds.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Venmo Privacy Settings 2026: Make All Payments Private in 60 Seconds</media:title></media:content></item><item><title>June Is National Internet Safety Month: Where Did It Come From?</title><category>Cybersecurity News</category><dc:creator>Chuck Davis</dc:creator><pubDate>Thu, 12 Jun 2025 20:49:18 +0000</pubDate><link>https://www.betweenthehacks.com/blog/national-internet-safety-month-2025</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:6843389647302e09bdd2eed7</guid><description><![CDATA[National Internet Safety Month was born in 2005 to raise awareness around 
growing online risks. Nearly 20 years later, its message is more relevant 
than ever. Here’s how it started—and why it still matters.]]></description><content:encoded><![CDATA[<h1>June Is National Internet Safety Month: Where Did It Come From?</h1><p class="">Every June, you'll see cybersecurity professionals, advocacy groups, and government agencies talking about <strong>National Internet Safety Month</strong>. But where did it come from? Who started it—and why June?</p><p class="">Let's rewind the clock.</p><h2>Born from a Growing Concern</h2><p class=""><strong>National Internet Safety Month</strong> was first recognized by the U.S. Senate in <strong>2005</strong> through Resolution 193. It was championed by organizations like the <strong>National Cyber Security Alliance (NCSA)</strong> and <strong>i-SAFE America</strong>, which were seeing an alarming rise in cyberbullying, online predators, and internet scams, especially targeting children and teens.</p><p class="">This was the MySpace era. YouTube was brand new. Facebook hadn't even opened to the public yet. But even then, policymakers saw the writing on the wall: the internet was becoming woven into daily life, and digital risks were growing just as fast.</p><p class="">The goal was simple: raise awareness, encourage safe online behavior, and equip families, educators, and individuals with practical tools to protect themselves.</p><h2>Fast Forward to Today</h2><p class="">Two decades later, the internet is everywhere. Our refrigerators have IP addresses. Kids grow up with smartphones. And cyberthreats? They're more advanced—and more personal—than ever.</p><p class="">What started as a safety campaign for kids has evolved into a <strong>national call for better digital hygiene</strong> across all ages. From phishing-resistant authentication and device patching to securing home routers and using password managers, the basics still matter.</p><p class="">And the risks? They've moved from chat rooms to cloud infrastructure, from stolen AIM passwords to ransomware hitting entire hospitals.</p><h2>Why It Still Matters</h2><p class="">National Internet Safety Month might not trend on TikTok. But it's a good reminder that <strong>online safety isn't a one-time setup, it's a habit</strong>.</p><p class="">Whether you're helping your kids recognize scams, checking your software updates, or segmenting your smart home network (yes, that's a thing), now is a great time to tighten up your digital defenses.</p><p class="">So while June may be <em>officially</em> Internet Safety Month in the U.S., the message is global—and timeless.</p><p class="">Stay safe out there. 🔐</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1749236152372-0K0XR9FRJTTQB3856CS5/NationalInternetSafetyMonth2025.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">June Is National Internet Safety Month: Where Did It Come From?</media:title></media:content></item><item><title>The 10-Minute Security Checkup Everyone Should Do This Weekend</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Sun, 01 Jun 2025 19:54:27 +0000</pubDate><link>https://www.betweenthehacks.com/blog/10-minute-security-checkup</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:683ca8b01b0a0242c3380b63</guid><description><![CDATA[Skip the cybersecurity overwhelm. This 10-minute weekend checklist covers 
the essential security tasks that actually matter—from software updates to 
MFA setup. No jargon, no scare tactics, just practical steps anyone can 
follow to lock down their digital life.]]></description><content:encoded><![CDATA[<h1>The 10-Minute Security Checkup Everyone Should Do This Weekend</h1><p class="">It's Sunday morning. You're in your pajamas, scrolling through your phone, probably ignoring that software update notification that's been pestering you for weeks. Here's the thing: those 10 minutes you'd spend updating your phone could save you from becoming the star of next month's data breach headlines.</p><p class="">I know, I know, cybersecurity feels like homework. But you don't need to be a CISO or an IT wizard to protect yourself. You just need 10 minutes, a cup of coffee, and maybe the willingness to admit that "password123" isn't cutting it anymore.</p><p class="">Consider this your cybersecurity spring cleaning, except it's way less work than reorganizing that junk drawer.</p><h2>☐ <strong>1. Check for software updates</strong> <em>(2 minutes)</em></h2><p class="">Phones, laptops, tablets, that smart TV you bought three years ago, make sure everything's running the latest version. Updates don't just bring new features, they patch the security holes attackers love to exploit.</p><p class="">📱 <strong>iPhone or Android?</strong> Go to Settings &gt; Software Update and make sure auto-updates are on.</p><p class="">💻 <strong>Windows/Mac?</strong> Update your OS and check your browser while you're at it. Yes, your smart toaster probably needs updating too. I know, I know, what has the world come to?</p><h2>☐ <strong>2. Enable Multi-Factor Authentication (MFA)</strong> <em>(3 minutes)</em></h2><p class="">If you're still logging in with just a password, you're one phishing email away from trouble. Even cybersecurity experts like <a href="https://www.betweenthehacks.com/blog/troy-hunt-phished">Troy Hunt fall for sophisticated phishing attacks</a> so we all need to be diligent! </p><p class="">Add <a href="https://www.betweenthehacks.com/blog/mfa" target="_blank">MFA</a> (text, app, or better yet, a security key) to your important accounts: email, banking, work, and cloud storage.</p><p class="">🔐 Start with <a href="https://2fa.directory">2fa.directory</a> to find out which services support it.</p><h2>☐ <strong>3. Give your router some attention</strong> <em>(2 minutes)</em></h2><p class="">Your Wi-Fi router is the front door to your digital home. Here are the big three things that actually matter:</p><ul data-rte-list="default"><li><p class=""><strong>Change the admin password</strong> (yes, from "admin/admin"!)</p></li><li><p class=""><strong>Make sure WPA3 or WPA2 is enabled</strong> (not WEP…WEP is from the stone age)</p></li><li><p class=""><strong>Update the firmware and enable automatic updates if possible</strong> (if not, remember to check this at least monthly or buy a new router that gets automatic updates)</p></li></ul><p class="">Bonus points if you replace that ancient router that came free with your ISP in 2017. That thing has seen some stuff.</p><h2>☐ <strong>4. Scan your passwords</strong> <em>(2 minutes)</em></h2><p class="">Use a <a href="https://www.betweenthehacks.com/blog/passwordmanagers" target="_blank">password manager</a> like <a href="https://1password.com" target="_blank">1Password</a>, <a href="https://bitwarden.com" target="_blank">Bitwarden</a>, or <a href="https://support.apple.com/en-us/120758" target="_blank">Apple Keychain</a> (great if you use all Apple products) to check for reused or breached passwords. If you're still using "password123" anywhere, we need to have a serious talk.</p><p class="">The password manager will do the heavy lifting—you just need to look at the scary red warnings and fix them.</p><h2>☐ <strong>5. Play "What's Connected to My Wi-Fi?"</strong> <em>(1 minute)</em></h2><p class="">Open up your Wi-Fi router's device list and see what's hanging out on your network. That mystery device might be your smart doorbell that you forgot you connected, or it could be your teenager's friend who guessed your Wi-Fi password. Either way, it’s worth investigating.</p><p class="">Don't recognize something? Time to change that Wi-Fi password.</p><h2>☐ <strong>6. Back up your files</strong> <em>(Set it and forget it)</em></h2><p class="">Ransomware's favorite victims are the ones without backups. Use a secure cloud service or an external hard drive. Just make sure external drives are disconnected when not in use, ransomware is sneaky and will encrypt your backups too if it has access.</p><p class="">If you're already backing up to the cloud, give yourself a pat on the back and move on.</p><h2>☐ <strong>7. Lock your phone's SIM</strong> <em>(1 phone call)</em></h2><p class="">Most people don't realize attackers can clone a SIM and steal SMS-based MFA codes. Call your carrier and add a PIN to your account. Yes, you have to talk to a human. Yes, it's worth it.</p><h2><strong>Reality Check: The Big Three</strong></h2><p class="">Look, if you only do three things from this list, make them: <strong>updates, MFA, and backups</strong>. Everything else is gravy, but these three will save your digital bacon when things go sideways.</p><h2><strong>What NOT to Panic About</strong></h2><p class="">While you're feeling motivated, don't go overboard. You don't need to:</p><ul data-rte-list="default"><li><p class="">Buy a $500 enterprise firewall for your home</p></li><li><p class="">Memorize 50-character passwords (that's what password managers are for)</p></li><li><p class="">Unplug every smart device in your house (just keep them updated)</p></li></ul><h2>🚀 <strong>That's it. You're already more secure than 90% of people online.</strong></h2><p class="">Security doesn't have to be overwhelming. A few simple habits, done consistently, go a long way. It's like flossing, but for your digital life.</p><p class=""><strong>Send this to your team, your family, or your least-secure friend. (You know the one.)</strong></p><p class="">And if you're feeling ambitious after crushing this list? Take a victory lap. You've just done more for your security than most people do all year.</p><p class="">Stay safe out there. 🔐</p><p class=""><strong>Tip of the Week:</strong> Set a calendar reminder to do this checkup quarterly. Future you will thank present you when you're not frantically trying to remember passwords during the next major data breach.</p><p class=""><a href="https://betweenthehacks.com" target="_blank"><em>betweenthehacks.com</em></a></p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1748806100238-PE8EE7XOC9KXAKM220J6/10-minute-security-checkup.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">The 10-Minute Security Checkup Everyone Should Do This Weekend</media:title></media:content></item><item><title> The Spy Who Applied to Code</title><category>Cybersecurity News</category><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Mon, 05 May 2025 14:49:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/the-spy-who-applied-to-code</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:6816b9956b109423979e0a39</guid><description><![CDATA[Think fake job applicants are just awkward interviews and padded resumes? 
Think again. One North Korean operative nearly infiltrated a U.S. crypto 
firm by pretending to be a software engineer named “Steven Smith.” This 
story, and the red flags it raised, is a must-read for anyone hiring 
online.]]></description><content:encoded><![CDATA[<h1><strong>🎭 The Spy Who Applied to Code</strong></h1><p class="">What if your next remote hire wasn’t a developer, but a North Korean spy?</p><p class="">No, it’s not a Netflix plot. It happened. And the story is wild.</p><h2><strong>👨‍💻 “Steven Smith,” Software Engineer (and Spy)</strong></h2><p class="">In October 2023, the hiring team at Kraken, a U.S.-based crypto exchange, received an application from someone named Steven Smith. On paper, he was a strong candidate, a Computer Science degree from NYU, 11+ years of experience, and stints at companies like Cisco. But something felt off.</p><p class="">🎃 <strong>Red Flags Everywhere</strong></p><p class=""><strong>Nick Percoco</strong>, Chief Security Officer at Kraken, wasn’t ready to toss the application just yet. Sensing something deeper at play, he decided to move “Steven” forward in the hiring process—not to hire him, but to test him.</p><p class="">So they set up what looked like a casual cultural interview. In reality, it was a trap.</p><p class="">And “Steven” walked right into it.</p><p class="">Said he liked “food,” but couldn’t name a single favorite. (Suspicious behavior for a self-proclaimed foodie.)</p><p class="">Claimed to live in Houston, but when asked about local restaurants, he blanked.</p><p class="">Had no idea what Halloween was. A tough sell for someone supposedly living in the U.S.</p><p class="">And when asked for ID, he produced one… with an address <em>hundreds</em> of miles from where he said he lived.</p><p class="">You don’t need to be a detective to spot something wrong here. It sounded like a spy movie, and honestly, it kind of was.</p><p class=""><strong>💣 Why It Matters: The North Korean Threat</strong></p><p class="">North Korean operatives have been posing as remote IT workers to infiltrate U.S. companies. Their goal? Fund the regime’s weapons programs and, if possible, steal from inside.</p><p class="">📊 The stats:</p><ul data-rte-list="default"><li><p class="">Fortune <a href="https://fortune.com/2025/04/07/north-korean-it-workers-infiltrating-fortune-500-companies/" target="_blank">reports</a>, Thousands of North Korean IT workers have infiltrated the Fortune 500.</p></li><li><p class="">CrowdStrike <a href="https://www.crowdstrike.com/en-us/global-threat-report/" target="_blank">reported</a> a North Korean IT workers group called Famous Chollima were behind more than 300 incidents last year.</p></li><li><p class="">The <a href="https://attack.mitre.org/groups/G0032/" target="_blank">Lazarus Group</a> has pulled off some of the largest crypto heists in history.</p></li></ul><p class="">Kraken may have dodged a bullet, but many others weren’t so lucky.</p><p class="">🎥 Watch the Interrogation</p><p class="">Want to see what this looked like in action? Here’s CBS coverage of the story and “Steven” being asked about his favorite restaurant:</p>





















  
  




  
    
  <iframe allowfullscreen src="https://www.youtube.com/embed/2vXHlnjKbBI" title="North Korean Spy Interview Clip"></iframe>

  




  <h2><strong>🔍 Tips to Spot a Faked Identity in Remote Interviews</strong></h2><p class="">Here’s how you can tighten your interview process:</p><h3><strong>1. Location-Specific Questions</strong></h3><p class="">Ask about:</p><ul data-rte-list="default"><li><p class="">Local holidays (like Halloween!)</p></li><li><p class="">Favorite places to eat</p></li><li><p class="">Regional slang or events</p></li></ul><h3><strong>2. Ask for Real-Time ID Verification</strong></h3><ul data-rte-list="default"><li><p class="">Use video to ask for government-issued ID.</p></li><li><p class="">Compare the location on the ID to their resume and story.</p></li><li><p class="">Watch body language. Stalling might be a red flag.</p></li></ul><h3><strong>3. Behavioral Consistency</strong></h3><ul data-rte-list="default"><li><p class="">Do answers match the resume?</p></li><li><p class="">Do they sound rehearsed or copy/pasted?</p></li><li><p class="">Ask open-ended questions to gauge authenticity.</p></li></ul><h3><strong>4. Technical Checks</strong></h3><ul data-rte-list="default"><li><p class="">Check social media accounts and compare LinkedIn profiles against the resume.</p></li><li><p class="">Contact references and check their LinkedIn and social media accounts too.</p></li><li><p class="">Check IP addresses if possible.</p></li><li><p class="">Verify timezone activity in collaboration tools.</p></li><li><p class="">Use background screening vendors that flag known fraud patterns.</p></li></ul><h2><strong>🎯 What This Means for Hiring Teams</strong></h2><p class="">Kraken didn’t just dodge a bullet, they turned a threat into a teachable moment that we can all learn from.</p><p class="">🔐 <strong>Remote hiring isn’t going away</strong>. Neither are social engineering threats. In fact, they’re evolving. With <a href="https://theweek.com/tech/deepfakes-and-impostors-the-brave-new-world-of-ai-jobseeking?utm_source=chatgpt.com" target="_blank">AI-generated avatars</a> and <a href="https://eftsure.com/blog/cyber-crime/what-is-an-ai-voice-scam/?utm_source=chatgpt.com" target="_blank">voice cloning tools</a> becoming almost indistinguishable from real people, verifying identity in virtual interviews is only getting harder.</p><p class="">That means it’s time to rethink how we screen candidates, especially for remote roles with access to sensitive systems. Companies need stronger identity verification practices, not just background checks, but real-time, human-led vetting and technical testing.</p><p class=""><strong>Go Deeper</strong></p><ul data-rte-list="default"><li><p class=""><a href="https://www.wired.com/story/north-korea-stole-your-tech-job-ai-interviews/" target="_blank">North Korea Stole Your Job: Wired</a> (More wild North Korean remote IT job stories)</p></li><li><p class="">Read the fascinating book, <a href="https://www.penguin.co.uk/books/447163/the-lazarus-heist-by-white-geoff/9780241554272" target="_blank">The Lazarus Heist</a> by <a href="https://geoffwhite.tech/" target="_blank">Geoff White</a> to learn more about the Lazarus Group</p></li></ul><p class=""><em>Big thanks to my buddy Chris Young, who casually mentioned this story and accidentally triggered a full blog post. Honestly, this one’s kind of your fault.</em></p><p class=""><strong>Want more stories like this?</strong></p><p class="">Subscribe to <a href="https://www.betweenthehacks.com/mailing-list" target="">Between The Hacks</a> and follow us for more practical cybersecurity with a human twist.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1746322219237-TGDFIVYYV8AB8KHJ63AA/NorthKoreanHackersApply.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain"> The Spy Who Applied to Code</media:title></media:content></item><item><title>World Password Day</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Thu, 01 May 2025 15:10:56 +0000</pubDate><link>https://www.betweenthehacks.com/blog/worldpasswordday2025</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:68138001477203738c0f6ddb</guid><description><![CDATA[Passwords are still the leading cause of breaches, and most of us still 
treat them like an afterthought. This post breaks down where we’re going 
wrong, what’s finally getting better, and why passkeys might be our best 
shot at a password-free future.]]></description><content:encoded><![CDATA[<h1><strong>World Password Day 2025: Let’s Be Honest, Passwords Are Tired</strong></h1><p class="">Happy World Password Day! 🎉</p><p class="">Or… maybe “happy” is a stretch. Because the truth is, passwords are still the #1 reason most people get hacked, and most of us still kinda stink at them.</p><p class="">We reuse them.</p><p class="">We forget them.</p><p class="">We store them in Notes apps like it’s totally fine.</p><p class=""><strong>We know better. We just haven’t gotten better. Yet. So let’s change that today.</strong></p><h2><strong>🔑 The State of Passwords (Still Not Great)</strong></h2><p class="">Despite all the breaches and all the warnings, bad password habits are still alive and well.</p><p class="">According to a <a href="https://cybernews.com/best-password-managers/most-common-passwords/" target="_blank">recent analysis by Cybernews</a>, people are still using gems like:</p><ul data-rte-list="default"><li><p class="">123456</p></li><li><p class="">qwerty</p></li><li><p class="">111111</p></li><li><p class="">and yes… password</p></li></ul><p class="">Some of these have been cracked <strong>millions of times</strong>—and people are still using them.</p><p class="">But there’s hope.</p><p class="">More people are finally adopting password managers.</p><p class="">Multi-factor authentication is becoming the norm (not the exception).</p><p class="">And best of all—<strong>passkeys</strong> are finally giving us a way out of this mess.</p><h2><strong>✅ What You Should Do Today</strong></h2><p class="">If you do nothing else this Password Day, do <em>one</em> of these:</p><ul data-rte-list="default"><li><p class="">Switch to a password manager (<a href="https://bitwarden.com">Bitwarden</a>, <a href="https://1password.com">1Password</a>, <a href="https://support.apple.com/en-us/120758">iCloud</a>—just pick one)</p></li><li><p class="">Turn on MFA for your most important accounts</p></li><li><p class="">Delete any saved passwords hiding in your browser</p></li><li><p class="">Set a calendar reminder to reset old, bad passwords, monthly.</p></li><li><p class="">Try logging in with a <strong>passkey</strong> instead of a password</p></li></ul><p class="">Need help with that last one?</p><p class="">Check out <a href="https://betweenthehacks.com/blog/passkeys">my blog on passkeys</a> to see why they’re better in every way.</p><h2><strong>🔁 Want to Go Deeper?</strong></h2><p class="">Here are a few past Between the Hacks posts worth revisiting (or reading for the first time):</p><ul data-rte-list="default"><li><p class="">📝 <a href="https://www.betweenthehacks.com/blog/worldpasswordday2021">World Password Day 2021</a> – A look back at bad habits and how to break them</p></li><li><p class="">🔐 <a href="https://www.betweenthehacks.com/blog/passwordspart1">Passwords Part 1</a> – Why password security still matters</p></li><li><p class="">🧠 <a href="https://www.betweenthehacks.com/blog/passwordmanagers">Password Managers</a> – How to pick one and why you should</p></li><li><p class="">🧬 <a href="https://www.betweenthehacks.com/blog/rainbowtables">Rainbow Tables</a> – How your weak password can be cracked in seconds</p></li><li><p class="">✅ <a href="https://www.betweenthehacks.com/blog/mfa">Why MFA Isn’t Optional Anymore</a> – Seriously, just turn it on</p></li><li><p class="">🔑 <a href="https://betweenthehacks.com/blog/passkeys">Passkeys: The Future of Logins</a> – The better, safer alternative to passwords</p></li></ul><h2><strong>🔒 TLDR</strong></h2><p class="">Passwords are still around, but they don’t have to be painful.</p><p class="">Use a password manager.</p><p class="">Turn on MFA.</p><p class="">Try a passkey.</p><p class="">And please—retire iloveyou123 already.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1746111763305-ON7ZC6PG6UPW32R5GC2M/WorldPasswordDay2025.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">World Password Day</media:title></media:content></item><item><title>10 Ways to Secure Your Laptop</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Mon, 28 Apr 2025 14:58:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/10-ways-to-secure-your-laptop</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:5ef9127c61489c0a023c1f1e</guid><description><![CDATA[Laptops are magnets for thieves, hackers, and nosy strangers on airplanes. 
This guide walks you through 10 smart ways to secure your 
laptop—physically, digitally, and privately—so your files stay safe, your 
data stays yours, and your webcam isn’t watching you back.]]></description><content:encoded><![CDATA[<h1><strong>10 Ways to Secure Your Laptop</strong></h1><p class="">Laptops are our mobile command centers. They carry our work, our memories, and sometimes even our deepest secrets (looking at you, 10-year-old folder named “Taxes”). If you lose one, or worse, if someone gets into it, it’s more than inconvenient. It’s a digital disaster.</p><p class="">Here are 10 simple ways to secure your laptop physically, digitally, and privately.</p><h2><strong>🔒 Physical Security</strong></h2><p class=""><strong>1. Use a </strong><a href="https://www.amazon.com/stores/page/BDB9D2D2-2105-4120-BC61-4A87DFBD719A/" target="_blank"><strong>Kensington Cable Lock</strong></a></p><p class="">It’s old-school, but it works. Especially in coffee shops, coworking spaces, and conferences. Lock it or lose it.</p><p class=""><strong>2. Keep It Out of Sight</strong></p><p class="">Leaving your laptop in a car? Lock it in the trunk. Use a cable lock there too if you can. Smash-and-grabs are still a thing.</p><h2><strong>💻 Digital Security</strong></h2><p class=""><strong>3. Encrypt Your Drive</strong></p><p class="">Whether you’re using BitLocker (Windows) or FileVault (macOS), encryption ensures your data is unreadable if your laptop is stolen.</p><p class=""><strong>4. Set a Strong Password</strong></p><p class="">Yes, you still need one, even with biometrics. Use a <a href="https://www.betweenthehacks.com/blog/passwordspart1">long, unique password</a> and avoid reusing it across accounts.</p><p class=""><strong>5. Back Up Your Data</strong></p><p class="">Cloud, external drive, or both. Backups protect you from ransomware, hardware failure, and accidental “whoops” moments. Check out <a href="https://www.betweenthehacks.com/blog/backups" target="_blank">this Between The Hacks blog</a> for tips about backing up your system.</p><p class=""><strong>6. Keep Your Software Updated</strong></p><p class="">That update you keep postponing? It probably includes security patches. Update your OS and apps regularly.</p><h2><strong>🕵️‍♂️ Privacy</strong></h2><p class=""><strong>7. Add a Privacy Screen</strong></p><p class="">Prevent shoulder-surfers from reading your screen on planes, in cafes, or in open offices.</p><p class=""><strong>8. Use a VPN on Public Wi-Fi</strong></p><p class="">Coffee shops and airport Wi-Fi are not your friends. A VPN encrypts your internet traffic and helps protect sensitive info from snoopers. Pro tip: using your mobile phone as a hotspot is even safer.</p><p class=""><strong>9. Cover Your Webcam</strong></p><p class="">Cheap fix. Creepy problem. Use a slide cover or a piece of tape, just make sure it’s not the translucent logo sticker from your last conference.</p><h2><strong>🔟 Enable Device Tracking</strong></h2><p class="">Most operating systems offer tools to locate, lock, or wipe your laptop if it’s lost or stolen. Turn it on!</p><p class="">Laptops are expensive. Your data is priceless. Take a few minutes to lock things down, you’ll thank yourself later.</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1745114871296-VCMEGON4KTTZ45O4NGQ5/10WaysToSecureLaptop.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">10 Ways to Secure Your Laptop</media:title></media:content></item><item><title>Quishing: Phishing Got a Glow-Up</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Thu, 24 Apr 2025 14:46:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/quishing</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67fb1d7d60fd5933793485f4</guid><description><![CDATA[Quishing is phishing’s slicker, sneakier cousin. It hides behind QR codes, 
shows up on flyers and parking meters, and tricks you into handing over 
your credentials, often before your coffee kicks in. Here’s how it works, 
who it’s targeting, and how to stop it.]]></description><content:encoded><![CDATA[<h1><strong>Quishing: Phishing Got a Glow-Up</strong></h1><p class="">I was at a taco place recently, the kind with metal chairs, a chalkboard menu, and indie music playing just a little too loud. Instead of physical menus, they had a paper sign taped to the table with a QR code that said, <em>“Scan me for magic.”</em></p><p class="">And because I’m a functioning adult with questionable curiosity and a decent data plan, I scanned it.</p><p class="">Thankfully, it went to the menu.</p><p class="">But it got me thinking.</p><p class="">I have a car wash subscription at one of those self-serve places. No employees, no kiosk. Just a high-powered wand, a set of dials, and a QR code on the wall. To activate the wash, I open their app on my phone and scan the code. That’s it. The system turns on instantly.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png" data-image-dimensions="1024x1024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=1000w" width="1024" height="1024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/5b3342a7-ce06-4c5d-885d-e4024bc7472b/Quishing02.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">But what if someone tampered with that code?</p><p class="">What if a threat actor placed a rogue QR code over the real one? Not to start the wash, but to trigger malware or a spoofed login page? Just like that, what felt like a simple scan becomes a security breach.</p><p class="">Welcome to the world of <strong>quishing</strong>, where convenience meets compromise and attackers count on you not thinking twice.</p><h2><strong>🤔 What is Quishing?</strong></h2><p class="">“Quishing” is short for <em>QR code phishing</em>. It’s a terrible name for a terrible tactic, like putting a sticker over a traffic sign and hoping someone drives into a ditch.</p><p class="">But instead of a misleading road sign, it’s a QR code. Instead of clicking a suspicious link in an email or text, you’re scanning it with your phone, often without thinking twice. And that scan could lead to a spoofed login page, a malware download, or a website designed to steal your credentials.</p><p class="">QR codes are everywhere now: restaurant tables, parking meters, flyers, job postings, taped-up posters on telephone poles, even car washes. That ubiquity makes them the perfect tool for cybercriminals who count on one thing, your curiosity.</p><h2><strong>📲 How Quishing Works</strong></h2><p class="">Here’s how it usually plays out:</p><ul data-rte-list="default"><li><p class=""><strong>The Setup</strong> – The attacker creates a malicious URL that leads to a phishing page or file download.</p></li><li><p class=""><strong>The QR Code</strong> – They embed that URL in a QR code, then print it on a flyer, slap it on a sticker, or drop it into an email.</p></li><li><p class=""><strong>The Bait</strong> – The QR code promises something useful or urgent: “Parking info,” “Free Wi-Fi,” “Claim your gift card,” “Secure your account.”</p></li><li><p class=""><strong>The Trap</strong> – You scan it, tap the link, and you’re redirected to a fake site or unknowingly install malware.</p></li></ul>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png" data-image-dimensions="1536x1024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=1000w" width="1536" height="1024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/8294bfcf-f52d-4cf6-991b-2b9b8b3bd3b6/Quishing03.png?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">A particularly clever threat actor might tape their malicious QR code over a legitimate one, like the “free drink” coupon at a conference booth, and redirect you to a perfectly spoofed Microsoft 365 login page designed to steal your credentials the moment you sign in.</p><h2><strong>🧠 Why QR Codes Are the New Short URLs</strong></h2><p class="">Although QR codes have been around for years, their use exploded during the COVID-19 pandemic. They became the go-to solution for contactless menus, payments, and check-ins. In many ways, a QR code is just a modern version of a shortened URL — like bit.ly or tinyurl. You can’t see where it leads until you click… or in this case, scan.</p><p class="">Fun fact: we covered the risks of shortened URLs all the way back in our <a href="https://www.betweenthehacks.com/blog/anatomy-of-a-phishing-attack" target="_blank">very first blog post, <em>The Anatomy of a Phishing Attack</em>, published on December 5, 2012</a>. More than a decade later, the delivery method may have changed, but the deception game is still going strong.</p><p class="">And that’s what makes QR codes dangerous.</p><p class="">They’re incredibly useful and convenient — but they’re also perfect tools for threat actors. By hiding malicious URLs behind QR codes, attackers can trick people into scanning codes that:</p><ul data-rte-list="default"><li><p class="">Infect their devices with malware</p></li><li><p class="">Redirect them to fake login pages to steal credentials</p></li><li><p class="">Impersonate trusted sites like Gmail, Office 365, or mobile payment platforms</p></li></ul><p class="">And because scanning QR codes has become second nature, it’s easy to fall into the trap.</p><p class="">Think of it as phishing 2.0 — slicker, quicker, and easier to disguise.</p><h2><strong>🎯 Who’s Falling for This?</strong></h2><p class="">Short answer? Everyone.</p><p class="">Quishing is the perfect storm: it feels modern, it’s frictionless, and we’ve all been trained to scan QR codes without thinking twice. It’s a dream for attackers and a nightmare for the rest of us.</p><p class="">Here’s who’s getting caught:</p><ul data-rte-list="default"><li><p class="">Office workers scanning a parking validation code taped next to the elevator</p></li><li><p class="">Conference attendees scanning for swag or Wi-Fi (those branded lanyards? Not helping)</p></li><li><p class="">Restaurant diners just trying to order tacos, not realizing the QR code leads to a fake payment page</p></li><li><p class="">Small business owners clicking QR codes in fake invoice emails</p></li><li><p class="">Literally anyone who’s distracted, in a rush, or running on caffeine and vibes</p></li></ul><p class="">You don’t have to be careless. You just have to be human.</p><h2><strong>📰 Real-World Examples</strong></h2><h3><strong>🚗 Fake Parking Meters</strong></h3><p class=""><a href="https://www.businessinsider.com/scammers-qr-code-stickers-parking-meters-2022-1" target="_blank">Attackers placed QR code stickers on parking meters</a> in cities like Austin and San Antonio, redirecting people to fraudulent payment sites. Victims thought they were paying for parking — but they were actually paying a scammer.</p><h3><strong>🧾 Invoice Emails with QR Codes</strong></h3><p class="">Phishing emails are going QR-first too. Instead of a suspicious-looking link, they now include<a href="https://sublime.security/blog/business-email-compromise-fake-invoice-16800/" target="_blank"> fake invoices</a> with a message like:</p><p class=""><em>“Scan this code to view your bill.”</em></p><p class="">You scan it, and bam — you’re on a perfectly forged Microsoft 365 or Google Workspace login page, ready to hand over your credentials.</p><h3><strong>🧑‍💼 QR Codes on Job Posters</strong></h3><p class="">Some attackers are slapping malicious QR codes on job flyers posted in public spaces. They look like legit hiring ads or application portals — but scanning them leads to phishing pages designed to harvest your resume, personal info, or login credentials.</p><h2><strong>🔒 How to Stay Safe (Without Boycotting Every QR Code)</strong></h2><p class="">Look, I’m not here to cancel QR codes. Some of them really do lead to tacos. But here’s how to scan smarter, not scared:</p><p class="">✅ <strong>Preview the URL</strong></p><p class="">Most phone cameras (especially on iOS and Android) will show you the link before you open it. Take a second to actually read it.</p><p class="">If it says something like secure-google-login.yourinfo.badguy.biz — yeah, maybe don’t tap that.</p><p class="">✅ <strong>Don’t scan codes from strangers</strong></p><p class="">That sticker on a parking meter? The flyer taped to a light pole? Probably not your best move.</p><p class="">✅ <strong>Be extra cautious with QR codes in emails</strong></p><p class="">If an invoice email includes a QR code <em>instead</em> of a link, it’s already suspicious. Trust your gut.</p><p class="">✅ <strong>Look for HTTPS — but don’t rely on it alone</strong></p><p class="">A padlock icon means the connection is encrypted, not that the site is trustworthy. Scammers can get HTTPS too.</p><p class="">✅ <strong>Use mobile security apps</strong></p><p class="">Some mobile security tools can flag malicious links before they open. Think of it as backup for your eyeballs.</p><h2><strong>TL;DR</strong></h2><p class=""><strong>Quishing is just phishing with a glow-up.</strong></p><p class="">It’s sneaky, simple, and surprisingly effective, but not unstoppable.</p><p class="">You don’t need to swear off QR codes forever.</p><p class="">You just need to <strong>scan smart, check the link</strong>, and never trust a piece of paper taped to a parking meter.</p><blockquote><p class="">Want more tips like this? <a href="https://www.betweenthehacks.com/mailing-list" target="_blank">Subscribe to <em>Between the Hacks</em></a></p></blockquote>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1745425447396-83AUHNE0M55VM6JL287Y/QuishingBlogImage.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Quishing: Phishing Got a Glow-Up</media:title></media:content></item><item><title>Locking Down My Smart Thermostats Was a Nightmare (and What It Taught Me About IoT Security)</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Mon, 14 Apr 2025 14:13:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/thermostat</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67ec3e02b9516b48163f168a</guid><description><![CDATA[When I tried to lock down my smart thermostats, I discovered how hard it is 
to control what IoT devices connect to. Here’s what I learned—and why we 
need NetBOM.]]></description><content:encoded><![CDATA[<p class="">In today’s connected world, even something as simple as a thermostat relies on the Internet—and that dependence introduces real security risks.</p><p class="">I decided to find out the hard way.</p><h2>The Experiment: Restrict Everything, Then Allow What’s Needed</h2><p class="">I have two popular smart thermostats in my home. A few years ago, as part of a personal project, I wanted to see if I could restrict their outbound network access—essentially, implement a basic form of Zero Trust.</p><p class="">Using my home firewall, I blocked all outbound Internet traffic from the thermostats. They immediately dropped offline in the mobile app and stopped reporting any data. So far, so good: obviously, they were cloud-dependent.</p><h2>The Support Spiral Begins</h2><p class="">Next, I contacted the vendor’s technical support to ask for a list of IPs or domains the thermostat needed in order to function properly.</p><blockquote><p class=""><strong>Me:</strong>&nbsp;I’m trying to limit Internet access. Can you provide the IP addresses or domains the thermostat uses?</p><p class=""><strong>Support:</strong>&nbsp;Uh… just make sure ports 443 and 80 are open.</p></blockquote><p class="">When I pushed for specifics, they eventually said:</p><blockquote><p class="">“Just put it in the DMZ so it can talk to everything.”</p></blockquote><p class=""><strong>That’s not Zero Trust—that’s zero security.</strong></p><h2>Turning to Packet Captures</h2><p class="">I mirrored the thermostat’s traffic to a monitoring port and ran packet captures over a few days. Here’s what I found:</p><ul data-rte-list="default"><li><p class="">NTP (network time) servers</p></li><li><p class="">Cloud services—probably AWS or Azure</p></li><li><p class="">Analytics and telemetry domains</p></li><li><p class="">Push notification systems</p></li></ul><p class="">I built an allow-list based on this traffic and updated my firewall rules. But things were still flaky: mobile commands failed, firmware updates didn’t apply, and the sensors would randomly desync.</p><h2>What I Learned</h2><p class="">This experience confirmed three things:</p><ol data-rte-list="default"><li><p class=""><strong>Vendors rarely provide visibility</strong>&nbsp;into their products’ network dependencies.</p></li><li><p class=""><strong>Packet analysis is tedious and fragile</strong>—it’s not something most users can (or should have to) do.</p></li><li><p class=""><strong>Device behavior is dynamic</strong>, especially with third-party cloud services. Today’s domain could change tomorrow.</p></li></ol><h2>The Bigger Problem</h2><p class="">If I, a security professional, struggled to lock down two thermostats without breaking them, what chance does the average homeowner or small business have?</p><p class="">This is why I started working on a solution: the&nbsp;<strong>Network Bill of Materials (NetBOM)</strong>. Think of it as a companion to the SBOM (Software Bill of Materials), but for network behavior. A NetBOM provides a structured, vendor-supplied list of the domains, IPs, and services a device needs to communicate with on the Internet.</p><p class="">With NetBOM, instead of doing manual captures or begging support for documentation, you just import a NetBOM file into your firewall or security gateway and the system automatically builds the right policies. In a pinch, you could do it manually, but at least you have the information you need to secure your network.</p><h2>Final Thoughts</h2><p class="">IoT security isn’t just a big-company problem. It’s everyone’s problem—from homeowners to hospitals to high-tech manufacturers. We all deserve transparency and control over the devices we rely on every day.</p><p class="">NetBOM is a step toward making that vision real.</p><p class="">Want to learn more? Check out the&nbsp;<a href="https://www.netbom.net/">NetBOM white paper</a>.</p><p class="">If you want more details about my attempt to lock down the thermostats, <a href="https://www.netbom.net/blog/netbom-origin">read this blog</a>.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743542348397-ZH27ALWXZEN4NH6FZUFG/thermostatBlog.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Locking Down My Smart Thermostats Was a Nightmare (and What It Taught Me About IoT Security)</media:title></media:content></item><item><title>Ransomware: Because Who Doesn’t Want to Be Held Hostage by Their Own Files?</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Wed, 09 Apr 2025 14:03:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/ransomware</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:609c9832ba22155003aded97</guid><description><![CDATA[Ransomware: Because Who Doesn’t Want to Be Held Hostage by Their Own Files?

Ransomware is no longer just a hacker’s side hustle—it’s big business. In 
this post, we break down what ransomware is, how it works, who it targets 
(on purpose and by accident), and what you can do to stay safe. Featuring 
real-world examples, including some very aggressive office printersmme.]]></description><content:encoded><![CDATA[<h1><strong>Ransomware: Because Who Doesn’t Want to Be Held Hostage by Their Own Files?</strong></h1><p class="">You know that feeling when your laptop freezes and you whisper a silent prayer to the tech gods?</p><p class="">Now imagine it wakes back up with a note that says: </p><blockquote><p class=""><em>“Nice files you got there. Shame if something happened to them.”</em></p></blockquote><p class="">That, my friends, is ransomware.</p><p class="">It’s not new. It’s not subtle. And it’s not just your boss or your parents clicking on a shady link anymore (although let’s be honest… it’s still very much that). Ransomware has become one of the most profitable business models in cybercrime and one of the most frustrating threats for everyone from Fortune 500s to grandma’s cookie recipe collection.</p><p class="">Let’s break it down.</p><h1><strong>🤖 What&nbsp;Is Ransomware?</strong></h1><p class="">Ransomware is a type of malicious software that locks your files using encryption. Everything from your work documents to your vacation photos gets scrambled beyond recognition.</p><p class="">Then it hits you with a demand: <strong>Pay up or lose everything!</strong></p><p class="">What if someone broke into your house while you were away, changed all the locks, and said you need to pay them in Bitcoin if you want all of your things and access to your house again?</p><p class="">That’s ransomware in a nutshell.</p><h1><strong>💼 How Does It Work?</strong></h1><p class="">There are a few common ways it spreads:</p><ul data-rte-list="default"><li><p class=""><strong>Phishing emails</strong> – The classic “click this invoice” trap</p></li><li><p class=""><strong>Drive-by downloads</strong> – You visit a compromised site and get infected silently</p></li><li><p class=""><strong>Software vulnerabilities</strong> – Unpatched apps leave the door wide open</p></li><li><p class=""><strong>RDP brute force attacks</strong> – Hackers guess weak remote desktop passwords</p></li></ul><p class="">Once it gets in, ransomware encrypts your files and flashes a ransom note. Sometimes it also copies your data and threatens to publish it unless you pay. This is called double extortion and yes, it’s as gross as it sounds.</p><h1><strong>🎯 Who Gets Targeted?</strong></h1><p class="">Honestly? Everyone.</p><h2><strong>Purposeful targets:</strong></h2><ul data-rte-list="default"><li><p class="">Hospitals and schools</p></li><li><p class="">Local governments</p></li><li><p class="">Law firms, media companies, manufacturing plants</p></li><li><p class="">Infrastructure like pipelines and power companies</p></li></ul><h2><strong>Accidental targets:</strong></h2><ul data-rte-list="default"><li><p class="">A small business running Windows 7</p></li><li><p class="">Your aunt’s yoga studio website</p></li><li><p class="">That one guy in your fantasy football league who never updates his laptop</p></li><li><p class="">Anyone caught in a broad phishing campaign</p></li></ul><p class="">You don’t have to be important. You just have to be unprotected.</p><h1><strong>📰 Real-World Stories</strong></h1><p class="">Let’s start with a personal favorite.</p><h2><strong>🖨️ The Printer Invasion (2020)</strong></h2><p class="">In a ransomware attack straight out of a dark comedy, hackers used networked printers across multiple businesses to spit out physical ransom notes. Yes—actual paper. This story was so wild I covered it in <a href="https://www.betweenthehacks.com/blog/bth-news-21nov2020?rq=ransomware">a Between The Hacks blog post</a> back in 2020. The ransom demand printed line by line in bold font on conference room printers, lobby printers, even cash register receipt printers. If it hadn’t been real, it would have been hilarious. (<em>Well… it’s still hilarious.</em>)</p><h2><strong>🚨 </strong><a href="https://www.betweenthehacks.com/blog/colonialpipeline" target="_blank"><strong>Colonial Pipeline (2021)</strong></a></h2><p class="">Shut down one of the largest fuel pipelines in the U.S. Panic buying and gas shortages followed. They paid over <strong>four million dollars</strong>.</p><h2><strong>🏥 Change Healthcare (2024)</strong></h2><p class="">Massive ransomware attack disrupted pharmacies and billing systems across the country. Ransom rumored to be over <strong>twenty-two million dollars</strong>.</p><h2><strong>🎰 MGM and Caesars (2023)</strong></h2><p class="">Hackers used social engineering to gain access. Caesars reportedly paid quietly. MGM didn’t but lost more than <strong>$100 million</strong>.</p><h2><strong>💣 NotPetya (2017)</strong></h2><p class="">Disguised as ransomware, NotPetya was actually a <strong>wiper</strong>—designed to destroy, not profit. It started in Ukraine but quickly spread globally, crippling major companies like Maersk, Merck, and FedEx. Damages exceeded <strong>ten billion dollars</strong>. There was no ransom to pay and no key to recover your data. Just chaos, outages, and a very expensive lesson in global cyber risk.</p><h1><strong>🛡️ How to Protect Yourself</strong></h1><p class="">Good news: you don’t need to be a cybersecurity expert to protect yourself. Most ransomware protection boils down to smart habits and digital hygiene.</p><h3><strong>✅ </strong><a href="https://www.betweenthehacks.com/blog/backups" target="_blank"><strong>Back up your files</strong></a></h3><p class="">Use cloud backups or external drives that are not always connected. If you have clean backups, you can tell ransomware to take a hike.</p><h3><strong>✅ Keep your software updated</strong></h3><p class="">Yes, those annoying popups matter. Patches fix the vulnerabilities ransomware uses to get in.</p><h3><strong>✅ </strong><a href="https://www.betweenthehacks.com/phishing" target="_blank"><strong>Don’t click on sketchy stuff</strong></a></h3><p class="">Emails with urgent attachments or links? Think twice. Call the person if it seems fishy.</p><h3><strong>✅ Use </strong><a href="https://www.betweenthehacks.com/blog/passwordspart1" target="_blank"><strong>strong passwords</strong></a><strong> and </strong><a href="https://www.betweenthehacks.com/blog/mfa" target="_blank"><strong>MFA</strong></a></h3><p class="">Especially for email and cloud accounts. <a href="https://www.betweenthehacks.com/blog/passwordmanagers" target="_blank">Password managers help</a>.</p><h3><strong>✅ Use security software</strong></h3><p class="">Even free antivirus can catch common threats.</p><h3><strong>✅ Be suspicious</strong></h3><p class=""><a href="https://www.betweenthehacks.com/blog/2020/2/27/shark-gets-phished" target="_blank">If your “CEO” emails you asking for gift cards, maybe call them first.</a></p><h1><strong>🧠 TLDR</strong></h1><p class="">Ransomware isn’t going anywhere. It’s big business now. But that doesn’t mean you have to be an easy target. A few smart habits can go a long way.</p><p class="">And if nothing else, please <a href="https://www.betweenthehacks.com/blog/backups" target="_blank">back up your files</a>. You do not want to be explaining to your spouse why you just paid two thousand dollars in crypto to get your wedding photos back.</p><p class="">Stay safe. Stay patched. Share this with someone who could use a little ransomware reality check.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1744142557368-84LUHNOIEYF7WFM73OCO/ransomware.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Ransomware: Because Who Doesn’t Want to Be Held Hostage by Their Own Files?</media:title></media:content></item><item><title>A Note on Our Domain Update</title><category>Website Maintenance</category><dc:creator>Chuck Davis</dc:creator><pubDate>Fri, 04 Apr 2025 14:46:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/new-default-domain</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67ee9f3785cd7d61ab8356c7</guid><description><![CDATA[Between The Hacks has updated its default domain name to 
betweenthehacks.com. Everything is still here, but a few links might need 
attention. Learn more about this update and let us know if you spot any 
issues.]]></description><content:encoded><![CDATA[<p class=""><strong>A Note on Our Domain Update</strong></p><p class="">If you’ve been visiting this blog for a while, you might have noticed a small but important change: we’ve switched our default domain from <strong>ckd3.com</strong> to <strong>betweenthehacks.com</strong>.</p><p class="">For years, <strong>ckd3.com</strong> served as the primary address for Between The Hacks. Alongside it, domains like <strong>betweenthehacks.com</strong> and <strong>bth.news</strong> redirected to the same content, but the browser’s address bar would always display <strong>ckd3.com</strong>. However, as of this past week, <strong>betweenthehacks.com</strong> is now our main domain. That means when you visit the site, you’ll see <strong>betweenthehacks.com</strong> in your address bar instead of <strong>ckd3.com.</strong></p><p class="">Why the change? It’s simple: we wanted to better align the domain name with the blog’s branding and focus. “Between The Hacks” is how most people know the site, so making <strong>betweenthehacks.com</strong> our default domain just felt right.</p><p class="">What does this mean for you? For the most part, nothing should feel different. The same articles, resources, and updates are all still here. If you type <strong>ckd3.com</strong>, <strong>bth.news</strong>, or follow an old link, you’ll still end up on the correct site—just under the new domain. That said, we’re aware there may still be a few lingering links out there that don’t work as intended. If you come across any broken links, please let us know so we can fix them.</p><p class="">In the meantime, enjoy the same great content, now more directly connected to our name. Thanks for reading, and happy hacking!</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743695712251-1PABSQR6QHZMYJBZJ7SQ/defaultdomainchange1.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">A Note on Our Domain Update</media:title></media:content></item><item><title>Passkeys: The Beginning of the End for Passwords</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Thu, 03 Apr 2025 14:41:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/passkeys</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67eb1375a2a0c005893eb8a5</guid><description><![CDATA[Still using passwords? It might be time to move on.

    Passkeys are a simpler, more secure way to log in—no typing, no
    phishing, no stress. In this post, I break down how passkeys work, why
    they matter, and how you can start using them today.]]></description><content:encoded><![CDATA[<h1><strong>Passkeys: The Beginning of the End for Passwords</strong></h1><p class="">A few days ago, I posted about <a href="https://www.betweenthehacks.com/blog/troy-hunt-phished">Troy Hunt getting phished</a>, a cautionary tale if there ever was one. If a cybersecurity expert like Troy, who created <a href="https://www.betweenthehacks.com/blog/hibp"><em>Have I Been Pwned</em></a>, can fall for a phishing attack, then what chance do the rest of us have?</p><p class="">This is exactly why I’m excited about <strong>passkeys</strong>.</p><h2><strong>🔐 What Are Passkeys?</strong></h2>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg" data-image-dimensions="1024x1536" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=1000w" width="1024" height="1536" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/bffdbda0-19ad-48ac-9f8b-5094a603b1a9/passkeys01.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">In plain English: passkeys are a passwordless way to sign in that’s both more secure and easier to use. They’re built on public key cryptography and replace your password with a unique key pair:</p><ul data-rte-list="default"><li><p class="">The <strong>public key</strong> sits on the server.</p></li><li><p class="">The <strong>private key</strong> stays securely on your device.</p></li></ul><p class="">When you log in, the server sends a challenge that only your private key can answer. No shared secrets, no password to steal—just cryptographic magic that can’t be phished or guessed.</p><p class=""><em>Passkeys replace passwords with a simple, secure authentication experience.</em></p><h2><strong>✨ How It Works in Real Life</strong></h2><p class="">Using a passkey feels as simple as Face ID, Touch ID, or your device PIN—but that’s just one way to authenticate.</p><p class="">You can also use passkeys stored in your <a href="https://www.betweenthehacks.com/passwordmanagers"><strong>password manager</strong></a> (like iCloud Keychain, 1Password, or Bitwarden), or even on a <a href="https://www.betweenthehacks.com/blog/mfa"><strong>hardware security key</strong> like a YubiKey</a>. Some platforms even let you approve login requests on one device (like your phone) for another (like your laptop). Either way, there’s <strong>no password to type</strong>, and nothing for an attacker to steal or phish.</p><p class=""><em>Passkeys simplify the login experience while keeping your credentials secure.</em></p><h2><strong>📊 Why Passkeys Win</strong></h2><p class="">Let’s break it down:</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg" data-image-dimensions="1536x1024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=1000w" width="1536" height="1024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d7f879f3-8374-4293-9752-496cb8ed3101/passkeys03.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true"><em>Security Comparison Table</em></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <p class=""><em>Why passkeys win on every front: phishing-resistant, unique, and seamless.</em></p><h2><strong>📱 Real-World Usage</strong></h2><p class="">You’ve probably already seen passkeys in action. Companies like <strong>Google</strong>, <strong>Apple</strong>, <strong>PayPal</strong>, <strong>Amazon</strong>, and others have already rolled them out.</p><p class="">When you see the option to “Use a passkey,” take it. It’s not just easier—it’s <strong>far safer</strong>.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg" data-image-dimensions="1024x1024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=1000w" width="1024" height="1024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/2075233a-3aaa-424f-b0a3-1dd55d7bc1be/passkeys04.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p data-rte-preserve-empty="true"><em>Passkeys are already supported by major platforms like Apple, Google, and Amazon.</em></p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <h2><strong>🛠️ What’s the Catch?</strong></h2><p class="">We’re still in a transition phase. Not every site supports passkeys yet, and enterprise adoption takes time. But it’s moving fast—and password managers are now helping bridge the gap by syncing passkeys across platforms.</p><p class="">Whether you’re on iOS, Android, macOS, or Windows, support is growing every day.</p><h2><strong>🔚 The Bottom Line</strong></h2>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg" data-image-dimensions="1024x1024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=1000w" width="1024" height="1024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/9d925896-774c-4996-80f6-171afedbd662/passkeys06.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <p class="">Troy Hunt’s phishing story is a reminder that even the best of us are vulnerable. But passkeys change the game. They remove the single weakest link in almost every breach and compromise we’ve seen over the past 20 years: the humble (and all-too-human) password.</p><h2><strong>It’s time we move on.</strong></h2><p class="">Try passkeys the next time you see the option. You might just feel the future of authentication in your fingertips.</p>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743459904095-SDKCTC6LXGLQ0K5AE9TK/PasskeyBlogImg01.png?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Passkeys: The Beginning of the End for Passwords</media:title></media:content></item><item><title>I Finally Segmented My Network… by Cutting the Ethernet Cable!</title><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 01 Apr 2025 14:36:55 +0000</pubDate><link>https://www.betweenthehacks.com/blog/cut-ethernet-segmentation</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67ebebccd4caec1d689b217b</guid><description><![CDATA[After years of preaching network segmentation, I took it to the next
    level—by physically disconnecting everything. Scissors, copper mesh,
    and a rotating SSID script. What could go wrong?]]></description><content:encoded><![CDATA[<h1><strong>I Finally Segmented My Network… by Cutting the Ethernet Cable!</strong></h1><p class="">For years, I’ve preached the value of <a href="https://www.ckd3.com/blog/2018/10/15/home-network-segmentation-a-must-in-the-iot-era">network segmentation</a>.</p><p class="">Break your network into zones. Isolate IoT devices. Limit lateral movement. The usual.</p><p class="">But recently, I had a breakthrough. One so simple, so obvious, I’m frankly embarrassed I didn’t think of it sooner.</p><p class="">I cut the Ethernet cable.</p><h2><strong>A Revolutionary New Approach to Cyber Hygiene</strong></h2><p class="">It started with my <strong>smart thermostat</strong> acting up again. I asked myself: <em>Why does this thing even need to talk to the printer?</em>  Then it hit me:</p><blockquote><p class=""><strong>If devices shouldn’t talk to each other… maybe they just shouldn’t be connected.</strong></p></blockquote><p class="">So I grabbed my wire cutters and got to work.</p><ul data-rte-list="default"><li><p class="">The <strong>thermostat cable</strong>? Snip.</p></li><li><p class="">The smart TV? Unplugged, wrapped in aluminum foil, and relocated to a Faraday cage (a.k.a. my shed).</p></li><li><p class="">The printer? Now lives in the freezer, isolated and cold, but very secure.</p></li></ul><p class="">I call it <strong>Physical Zero Trust™</strong>.</p><p class="">No network, no problem.</p><h2><strong>What About Wi-Fi?</strong></h2><p class="">Don’t worry, I didn’t forget wireless.</p><p class="">To prevent rogue devices from reconnecting, I wrapped my Wi-Fi router in <strong>two layers of copper mesh</strong>, just to keep it humble.</p><p class="">Then I wrote a script that <strong>rotates the SSID to a new random 32-character string every 60 seconds</strong>.</p><p class="">Sure, nothing can actually connect anymore, but that’s the point.</p><p class="">This isn’t just segmentation, it’s <strong>Wireless Evaporation™</strong>.</p><h2><strong>Lateral Movement? Not on My Watch</strong></h2><p class="">In the past, I worried about attackers moving laterally across my flat home network. But with each device now physically relocated and completely offline, they’d need to:</p><ol data-rte-list="default"><li><p class="">Break into my house</p></li><li><p class="">Know which drawer the gaming console lives in</p></li><li><p class="">Hope the smart lightbulbs boot up</p></li><li><p class="">Reverse-engineer the thermostat using a flashlight and a coat hanger</p></li><li><p class="">Get past the Post-It note that says “Not today, threat actor.”</p></li></ol><p class="">It’s a bold move but one that has eliminated all east-west traffic, all telemetry, and (accidentally) all convenience.</p><h2><strong>Downsides</strong></h2><p class="">Okay, I’ll admit a few trade-offs:</p><ul data-rte-list="default"><li><p class="">The toaster no longer gets firmware updates.</p></li><li><p class="">I can’t remember where I put the router. It may be under the couch.</p></li><li><p class="">My wife says, “You’ve gone too far.” I say, “You can never be too segmented.”</p></li></ul><h2><strong>Final Thoughts</strong></h2><p class="">In an age of sophisticated cyber threats, we need bold, disruptive solutions.</p><p class="">You can keep your VLANs and firewall rules. I’ll be over here, living the air-gapped dream, with a network so secure, even <em>I</em> can’t use it.</p><p class="">Happy April Fools’ Day!</p><p class="">(And seriously… <a href="https://www.ckd3.com/blog/2018/10/15/home-network-segmentation-a-must-in-the-iot-era">go segment your network</a>.)</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743517714432-UABGP293ODLTLDICCKUQ/CutEthernet.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">I Finally Segmented My Network… by Cutting the Ethernet Cable!</media:title></media:content></item><item><title>Unlimited Access: Every Device on Your Network Can Talk to the Internet</title><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Sun, 30 Mar 2025 20:32:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/everything-is-connected</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67e70756203c2a19e331917e</guid><description><![CDATA[Most home devices can access the entire internet—and often each other.
    Segmentation helps, but without visibility into what your devices are
    doing, you’re still exposed.]]></description><content:encoded><![CDATA[<p class=""><strong>Unlimited Access: Every Device on Your Network Can Talk to the Internet</strong></p><p class="">Back in 2018, I wrote a post called <a href="https://www.ckd3.com/blog/2018/10/15/home-network-segmentation-a-must-in-the-iot-era"><em>Home Network Segmentation: A Must in the IoT Era</em></a>. It walked through how to isolate your smart devices, like TVs, thermostats, and cameras, from your laptops and phones. The goal? Keep the questionable stuff away from the critical stuff.</p><p class=""><strong>Nearly seven years later</strong>, the need for segmentation hasn’t gone away. If anything, it’s become more urgent.</p><p class="">Because here’s the truth:</p><p class=""><strong>Every device on your home network can probably talk to the entire Internet.</strong></p><p class="">And most of us have no idea if these devices are talking to the correct servers, or to threat actors, or if those devices need to talk to anything on the Internet at all!</p><p class=""><strong>Everything is connected.</strong></p><p class="">When you connect a new smart device, like a lightbulb or a smart plug, it typically:</p><ul data-rte-list="default"><li><p class="">Gets full access to the Internet.</p></li><li><p class="">Has permission to connect to <em>anything</em>.</p></li><li><p class="">Can often talk to every other device on your network, too.</p></li></ul><p class="">That’s the default. And unless you step in and change it, it stays that way.</p><p class="">This isn’t just an IoT problem. It’s a <strong>visibility</strong> problem. And a <strong>trust</strong> problem. We trust these devices to do what they need to in the background, and nothing more.</p><p class="">Spoiler alert: that’s not always the case.</p><p class=""><strong>Why Flat Networks Are Still a Problem</strong></p><p class="">In a flat network:</p><ul data-rte-list="default"><li><p class="">There is no segmentation.</p></li><li><p class="">No boundaries.</p></li><li><p class="">No meaningful control.</p></li></ul><p class="">A flat home network is like having a house where <strong>every room shares the same key</strong>, for both the front door and every interior door.</p><p class="">Once a visitor (or an intruder) gets hold of that single key, they immediately have access to <em>everything</em>: your bedroom, your home office, even the safe in the back room.</p><p class="">In this house, once someone gets through your front door (like a hacker breaching your router), they can move freely between all your connected devices. Your smart TV can talk to your work laptop. Your gaming console can reach your security cameras. And that cheap smart light bulb with outdated firmware? It can communicate with the computer that stores your tax returns.</p><p class="">Just like you wouldn’t give the delivery person access to your bedroom, you shouldn’t give unrestricted access to every device on your network.</p><p class=""><strong>And attackers know this.</strong></p><p class="">Many botnets and malware campaigns rely on phishing attacks to infect a system inside of your network, or they scan open ports and compromise devices, then move laterally through your network. If your smart plug gets compromised, your laptop might be next.</p><p class=""><strong>But What About My Firewall?</strong></p><p class="">A lot of people assume their firewall is blocking threats from the Internet.</p><p class="">And that’s technically true, <strong>if the threat starts from the outside.</strong></p><p class="">But here’s what most folks don’t realize:</p><p class="">Once a device <strong><em>inside</em></strong> your network makes a connection <strong><em>out</em></strong> to the Internet, the firewall allows that conversation to continue in both directions.</p><p class="">This is called <strong>stateful inspection</strong>, and it’s how most home firewalls, and even many business firewalls, work. The idea is simple:</p><p class="">“If a device inside the network started the conversation with a system on the Internet, it must be safe to continue.”</p><p class="">Sounds reasonable… until your smart device reaches out to a malicious server.</p><p class="">Or your fridge downloads a sketchy firmware update.</p><p class="">Or you click on the wrong link and infect your laptop with malware that connects to a malicious IP address.</p><p class="">Because your network allowed the <em>outbound</em> connection, it now trusts the <em>inbound</em> replies.</p><p class="">And that’s where risk lives.</p><p class="">Most home routers don’t log or flag this behavior. They just keep the door open.</p><p class=""><strong>But Here’s the Bigger Problem</strong></p><p class="">Let’s say you <em>do</em> segment your network (and if you haven’t, please read <a href="https://www.ckd3.com/blog/2018/10/15/home-network-segmentation-a-must-in-the-iot-era">that earlier post</a> and make it happen).</p><p class="">The next question becomes:</p><p class=""><strong>Do you know what your devices are actually doing?</strong></p><p class="">Do you know:</p><p class="">	•	What domains your thermostat is connecting to?</p><p class="">	•	If your smart TV just reached out to an unknown IP in another country?</p><p class="">	•	Whether that firmware update really came from the vendor?</p><p class="">We can’t defend what we can’t see.</p><p class="">And right now, most of us are blind.</p><p class=""><strong>We Need More Than Isolation…We Need Insight</strong></p><p class="">Network segmentation is an excellent first step. It limits exposure and buys you time. But it doesn’t give you visibility.</p><p class="">You still need to know:</p><ul data-rte-list="default"><li><p class="">What’s on your network</p></li><li><p class="">What it’s doing</p></li><li><p class="">What’s normal, and what’s not</p></li></ul><p class="">Because segmentation without insight is like putting your devices in separate rooms… and never checking what’s going on inside them.</p><p class=""><strong>Coming Soon…</strong></p><p class="">This is a problem I’ve been thinking about a lot lately.</p><p class="">Not just at home, but across supply chains, small businesses, and global enterprises.</p><p class="">We need a better way to understand device behavior, especially in a world where every smart toaster has a direct line to the entire Internet.</p><p class="">More on that soon.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743360941988-7790C6KU7G38N8BENN56/UnlimitedAccessImg31MAR2025.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">Unlimited Access: Every Device on Your Network Can Talk to the Internet</media:title></media:content></item><item><title>If Troy Hunt Can Fall for Phishing, So Can You</title><category>Cybersecurity News</category><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Fri, 28 Mar 2025 17:34:13 +0000</pubDate><link>https://www.betweenthehacks.com/blog/troy-hunt-phished</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67e6d3de28e9c3623cb388d0</guid><description><![CDATA[Even cybersecurity experts fall for phishing attacks. When Troy Hunt, 
creator of Have I Been Pwned, clicked a malicious link and entered his 
credentials, it was a wake-up call for all of us. In this post, we break 
down what happened, why today’s phishing is more convincing than ever, and 
what you can do to protect yourself.]]></description><content:encoded><![CDATA[<p class=""><strong>Title:</strong> <em>If Troy Hunt Can Fall for Phishing, So Can You</em></p><p class="">Let’s clear this up right away: falling for a phishing email doesn’t mean you’re clueless, lazy, or bad at your job.</p><p class="">Even <strong>Troy Hunt</strong>, yes, the guy behind <a href="https://www.ckd3.com/blog/hibp">Have I Been Pwned</a>, recently clicked on a phishing link. And not just clicked… he entered his credentials and a multi-factor authentication code into a spoofed website.</p><p class="">This isn’t about dunking on Troy. In fact, it’s quite the opposite. I appreciate that he went public with the story, because it gives all of us, security folks, business users, and IT teams, a reality check.</p><p class=""><strong>What Happened</strong></p><p class="">Here’s the quick version: Troy received an email that looked like it came from Mailchimp, his email marketing provider. The message claimed his account had been flagged for spam and that his ability to send emails was restricted.</p><p class="">It contained a link to a site at mailchimp-sso.com (which sounds <em>just</em> real enough), and when Troy followed the link, he was taken to what looked like Mailchimp’s login page. He entered his username, password, and a one-time passcode.</p><p class="">Then the page stalled out.</p><p class="">That’s the moment he realized something was wrong.</p><p class="">He immediately went to the real Mailchimp site, changed his password, and saw that his mailing list, about 16,000 email addresses, had already been exported by someone using an IP address in New York.</p><p class="">It was a well-crafted phishing email, sent at the perfect time (he was traveling, tired, and distracted), and it got him. You can read his account of the phish, <a href="https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/" target="_blank">here</a>.</p><p class=""><strong>Wait… Who Is Troy Hunt?</strong></p><p class="">If you’re not in the security industry, you might not recognize the name. Troy Hunt is the creator of <a href="https://www.ckd3.com/blog/hibp">Have I Been Pwned</a>, a service that lets you check if your email or password has ever been exposed in a data breach. He’s a respected voice in the cybersecurity world, and he’s helped millions of people understand digital risk.</p><p class="">So yeah, he’s one of the last people you’d expect to fall for a phishing attack.</p><p class=""><strong>Why This Matters</strong></p><p class="">We’re long past the days when phishing emails were filled with typos, fake Nigerian princes, or cartoonish grammar. Today’s attacks are:</p><ul data-rte-list="default"><li><p class=""><strong>Polished</strong> – Clean branding, real-sounding alerts, perfect English.</p></li><li><p class=""><strong>Timely</strong> – Triggering you when you’re most distracted.</p></li><li><p class=""><strong>Hyper-specific</strong> – Sometimes using scraped data, breached info, or even generative AI to add believable context.</p></li></ul><p class="">What got Troy wasn’t a lack of knowledge. It was a moment of humanity, one all of us are susceptible to. A split-second decision made while multitasking. That’s all it takes.</p><p class=""><strong>What We Can Learn</strong></p><p class="">Troy’s transparency gives us a chance to pause and revisit our own habits. Here are a few reminders that might help:</p><ol data-rte-list="default"><li><p class=""><strong>Slow down.</strong> The best phishing attacks create a sense of urgency. That’s intentional. Pause before clicking.</p></li><li><p class=""><strong>Hover and verify.</strong> Look at where a link <em>really</em> goes before clicking. mailchimp.com is legit. mailchimp-sso.com is not.</p></li><li><p class=""><strong>Use a password manager.</strong> They won’t auto-fill on fake sites. If you’re not using one yet, <a href="https://www.ckd3.com/blog/passwordmanagers">here’s why you should</a>.</p></li><li><p class=""><strong>Enable MFA.</strong> It’s not bulletproof, but it helps. And if you’re still unsure what that means, check out <a href="https://www.ckd3.com/blog/mfa">my post on multi-factor authentication (MFA</a>).</p></li><li><p class=""><strong>Normalize mistakes.</strong> The more shame we attach to “falling for it,” the fewer people will report incidents quickly.</p></li></ol><p class="">Want to understand how attackers use leaked credentials? Take a minute to read about <a href="https://www.ckd3.com/blog/credentialstuffing">credential stuffing</a>. It’s more common, and more dangerous, than most people realize.</p><p class="">And if you’ve ever wondered how phishing links might redirect you even when you type the right address, <a href="https://www.ckd3.com/blog/pharming">pharming</a> is a threat worth learning about too.</p><p class=""><strong>Final Thoughts</strong></p><p class="">The next time you start to say, “I would never fall for that,” remember Troy’s story. You might not fall for <em>that</em> one, but there’s always a more convincing phish right around the corner.</p><p class="">Phishing doesn’t care how smart you are. It cares how distracted you are.</p><p class="">And if it can fool someone who literally teaches the world how phishing works? It can fool any of us.</p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1743181897222-FVYNLQYM7DRZGUF11ALL/HaveIBeenPhished2.jpg?format=1500w" medium="image" isDefault="true" width="1024" height="1024"><media:title type="plain">If Troy Hunt Can Fall for Phishing, So Can You</media:title></media:content></item><item><title>AI Magic: My Blog, LinkedIn, and a 7-Minute Podcast!</title><category>Reviews</category><dc:creator>Chuck Davis</dc:creator><pubDate>Mon, 30 Sep 2024 17:01:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/ai-podcast</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:67001e0d313c307c4b8381fc</guid><description><![CDATA[So, here’s something that blew my mind: I decided to test 
Google’s NotebookLM AI tool. I casually uploaded the URLs for my LinkedIn 
page and my blog, not expecting much more than a basic summary. After about 
3–4 minutes of AI whirring away, I had…]]></description><content:encoded><![CDATA[<p class="">So, here’s something that blew my mind: I decided to test Google’s&nbsp;<a href="https://notebooklm.google.com/" target="_blank">NotebookLM</a> AI tool. I casually uploaded the URLs for my LinkedIn page and my blog, not expecting much more than a basic summary. After about 3–4 minutes of AI whirring away, I had…a <strong>podcast</strong> in the form of a WAV file.</p><p class="">Curious, I clicked play, and what I heard was <strong>incredible</strong>. Two AI voices (that sounded eerily human) were having a full-on conversation about <em>me</em>! They dove into my blog, discussed a few posts in surprising detail, and even brought up one of my <strong>patents</strong>. Now, here’s the kicker: the patents are only listed on my LinkedIn profile. So, in those few minutes, the AI not only found them but also looked them up, read through them and summarized one—<em>all within the few minutes it took the AI to create the podcast</em>!</p><p class="">I couldn’t help but think, “Wow, did this thing just casually do a week’s worth of research in minutes?” The voices didn’t sound like your typical robotic narrators either—they felt like real co-hosts chatting about my work and personal brand. Talk about efficiency!</p><p class="">This experience really made me reflect on how fast AI is evolving. Tools like this are moving way beyond simple automation, becoming more sophisticated in understanding and summarizing complex content. It’s a bit like having an overachieving intern who doesn’t need sleep, caffeine, or bathroom breaks—and who actually <em>reads</em> what you send them. Impressive, right?</p><p class="">So, yeah, the future’s looking pretty cool if you ask me. Next up: convincing the AI to write my next blog post…or maybe even interview me for real. ;)</p><p class=""><em>Please note that the podcast contains some inaccuracies, such as incorrectly identifying Merryl Goldberg as a code breaker, when in fact, she was more involved in code-making. I have kept the podcast in its original, unedited form to demonstrate how effective the tool is, even without specific guidance—simply by uploading two links.</em></p>]]></content:encoded><enclosure url="https://static1.squarespace.com/static/52ae955ce4b04f67f91b6df5/t/67001e2d5e2d5e4421899247/1728060980086/ChuckDavisPodcast.mp3" length="6677037" type="audio/mpeg"/><media:content url="https://static1.squarespace.com/static/52ae955ce4b04f67f91b6df5/t/67001e2d5e2d5e4421899247/1728060980086/ChuckDavisPodcast.mp3" length="6677037" type="audio/mpeg" isDefault="true" medium="audio"/></item><item><title>A Birthday Party, a Cold War Cipher, and the RSA Stage</title><category>Cybersecurity News</category><dc:creator>Chuck Davis</dc:creator><pubDate>Thu, 30 Jun 2022 00:39:31 +0000</pubDate><link>https://www.betweenthehacks.com/blog/dr-merryl-goldberg</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:62ab6e6362552249350091ed</guid><description><![CDATA[If you told me a year ago that I would meet a cold war hero at a birthday 
party, I wouldn’t have believed you. And I would be even more skeptical if 
you told me she would be an unintimidating, approachable music professor 
with an infectious smile. It’s the summer of 2021. After more than a year…]]></description><content:encoded><![CDATA[<p class="">Updated February 26, 2026.</p><p class="">In August 2026, Merryl Goldberg’s book will tell the full Cold War story behind the sheet music cipher that stunned the cybersecurity world. This post is the origin story of how that history moved from a Southern California birthday party to the keynote stage at the RSA Conference.</p>





















  
  



<hr />


  <p class="">In 2021, at a birthday party in Southern California, I met someone whose story would soon echo across the cybersecurity world. At the time, she seemed exactly what she was. A warm, approachable music professor with an infectious smile. What I did not know was that decades earlier, she had helped outsmart the KGB using sheet music as a cipher.</p><h2>The Birthday Party</h2><p class="">It was the summer of 2021. After more than a year without travel due to COVID, my wife, Kim, and I were eager to attend a close friend’s birthday gathering and spend a few quiet days in Southern California. The party was held at our friend’s home, and the weather made it easy for guests to drift between the house and the patio. We knew only a handful of people, so introductions came naturally. Names were exchanged. Conversations unfolded.</p><p class="">One of those introductions would soon matter.</p><p class="">At dinner, a woman at our table introduced herself as Merryl Goldberg, a music professor at California State University San Marcos. We quickly learned she was also an author and a boxer. The range alone made her memorable.</p><p class="">When Kim and I mentioned that we worked in cybersecurity, the conversation shifted. I noted how many security professionals are also musicians. The balance of creativity and logic is more common than most people realize. Merryl listened, smiled, and said she had a story for us.</p><p class="">What followed left our table stunned.</p><p class="">In the 1980s, she and fellow musicians encoded sensitive information into sheet music, allowing messages to pass the KGB and helping Soviet defectors escape. It sounded improbable. It was not.</p><p class="">Her story has since been told in detail by Wired and many others, and now in her forthcoming book. But that night, around a dinner table in Southern California, it was simply a remarkable story shared among new friends.</p><p class="">When the conversation resumed, I asked whether she had ever considered telling that story to a cybersecurity audience. She had not. She smiled again and said she would be open to it.</p><h2>Call For Speakers</h2><p class="">When Kim and I returned home, the story lingered. The more we thought about it, the more it felt like something the cybersecurity community needed to hear. We began drafting a submission to the RSA Conference Call for Speakers, outlining the unlikely intersection of music, cryptography, and Cold War history.</p><p class="">With Merryl’s approval, we submitted the proposal and waited.</p><p class="">In early October, I received an email from <a href="https://www.rsaconference.com/experts/Britta%20Glade">Britta Glade, the RSA Conference’s Senior Director of Content and Curation</a>. She wanted to hear the story firsthand. The keynote team, she explained, had ideas about how it might be presented. If everything came together, she wrote, “it will rock!”</p><h2>RSA Conference</h2><p class="">By the time the conference was rescheduled from February to June, the keynote plan had solidified. When the final details were confirmed, I booked my flight to San Francisco.</p><p class="">The night before the presentation, Merryl and I met for dinner. She was curious about the cybersecurity industry and asked thoughtful questions about the field that would soon hear her story. The parallels between music and technology resurfaced in our conversation. Patterns. Precision. Improvisation within structure.</p>





















  
  














































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg" data-image-dimensions="4032x3024" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=1000w" width="4032" height="3024" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d6470182-4607-462e-bfa4-6ecf5069f518/FullSizeRender.jpg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
      
        </figure>
      

    
  


  





  <h2>The Presentation</h2><p class="">On the morning of the keynote, the room filled quickly. Britta opened the session by reflecting on the relationship between music and programming before introducing Merryl to the stage.</p><p class="">The format was conversational. The story unfolded deliberately. A young musician in the 1980s. Sheet music passed between hands. Messages hidden in plain sight. The KGB listening, but not hearing.</p><p class="">The audience was riveted.</p><p class="">Earlier that day, I had mentioned Merryl’s story to Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency, and encouraged her to attend the keynote. As it happened, Jen was speaking just before Merryl, which gave them a few minutes together backstage. Their brief introduction would later grow into something more lasting. In the years since, Jen and Merryl have stayed connected, and Jen has invited her to participate in multiple events and discussions bridging history, music, and cybersecurity.</p>





















  
  






  

  



  
    
      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919496954-MSG0I1GRSVJFDUPTY7RQ/E5CC66B8-9941-443D-9672-2DAD98514F71_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="E5CC66B8-9941-443D-9672-2DAD98514F71_1_105_c.jpeg" data-load="false" data-image-id="62b35388ae808b186d6f94e6" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919496954-MSG0I1GRSVJFDUPTY7RQ/E5CC66B8-9941-443D-9672-2DAD98514F71_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919506699-2U6V3L07XDSJCM4KWNDO/0447B221-4DD6-4C6D-B2DD-7EFBD070A82E_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="0447B221-4DD6-4C6D-B2DD-7EFBD070A82E_1_105_c.jpeg" data-load="false" data-image-id="62b35392eef23b5fe363bb51" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919506699-2U6V3L07XDSJCM4KWNDO/0447B221-4DD6-4C6D-B2DD-7EFBD070A82E_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919516722-YACZ0DEODK7FCCWIE287/A138B704-B842-47E8-9600-2A246E09406A_1_105_c.jpeg" data-image-dimensions="1024x768" data-image-focal-point="0.5,0.5" alt="A138B704-B842-47E8-9600-2A246E09406A_1_105_c.jpeg" data-load="false" data-image-id="62b3539c958b9c6d8a6c6524" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919516722-YACZ0DEODK7FCCWIE287/A138B704-B842-47E8-9600-2A246E09406A_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919528834-3GA6S357T1YDROLKQO8X/C2F3AC98-4D47-4E57-A558-628BAFF4E75A_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="C2F3AC98-4D47-4E57-A558-628BAFF4E75A_1_105_c.jpeg" data-load="false" data-image-id="62b353a89c24c2543a71499f" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919528834-3GA6S357T1YDROLKQO8X/C2F3AC98-4D47-4E57-A558-628BAFF4E75A_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919540912-PNAYS310GRKM6IKKE766/6BAEA3FA-B30A-4352-AEBB-822A4ACCBF5A_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="6BAEA3FA-B30A-4352-AEBB-822A4ACCBF5A_1_105_c.jpeg" data-load="false" data-image-id="62b353b418398148f73c6743" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919540912-PNAYS310GRKM6IKKE766/6BAEA3FA-B30A-4352-AEBB-822A4ACCBF5A_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919551433-445VHGFS3F1Y7CH099AC/4B060016-2BD4-4048-9003-E6E4447A23ED_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="4B060016-2BD4-4048-9003-E6E4447A23ED_1_105_c.jpeg" data-load="false" data-image-id="62b353bfb5a3fe399309d469" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919551433-445VHGFS3F1Y7CH099AC/4B060016-2BD4-4048-9003-E6E4447A23ED_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919560456-BA37BQMNUQS5SAAPUUHE/3E62079B-9FB0-40EB-B781-46FEE7D22B50_1_105_c.jpeg" data-image-dimensions="769x1024" data-image-focal-point="0.5,0.5" alt="3E62079B-9FB0-40EB-B781-46FEE7D22B50_1_105_c.jpeg" data-load="false" data-image-id="62b353c8515cb707b8d0f024" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919560456-BA37BQMNUQS5SAAPUUHE/3E62079B-9FB0-40EB-B781-46FEE7D22B50_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919572891-N3HEI77Y6PQ3I0C3V5MV/17D22299-FE76-4876-ACB6-FF27412345C8_1_105_c.jpeg" data-image-dimensions="1024x769" data-image-focal-point="0.5,0.5" alt="17D22299-FE76-4876-ACB6-FF27412345C8_1_105_c.jpeg" data-load="false" data-image-id="62b353d49745787d86bef581" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1655919572891-N3HEI77Y6PQ3I0C3V5MV/17D22299-FE76-4876-ACB6-FF27412345C8_1_105_c.jpeg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      
    
  

  




  

    
      
          

        

        
      
          

        

        
      
          

        

        
      
          

        

        
      
          

        

        
      
          

        

        
      
          

        

        
      
          

        

        
      
    

  








  <h2>After the Talk</h2><p class="">After the talk, a crowd gathered at the front of the stage. Among them were Bruce Schneier and Wired reporter Lily Hay Newman. Conversations quickly turned to the cinematic quality of the story. It felt less like a conference session and more like the beginning of something.</p><p class="">Later, I walked Merryl through the vendor floor. The IBM booth featured a mixing board installation that illustrated a simple truth. Focus on everything at once, and you get noise instead of music.</p><p class="">At the NSA booth, a working Enigma machine drew a steady crowd. Given the reason we were there, it felt fitting to stand in front of one of history’s most famous encryption devices as it operated once again. Cryptography, past and present, seemed to converge in that moment.</p>





















  
  






  

  



  
    
      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1656351823268-D30KZI3NJ5JL4IKI2JYU/IMG_1724.jpg" data-image-dimensions="1284x942" data-image-focal-point="0.5,0.5" alt="IMG_1724.jpg" data-load="false" data-image-id="62b9ec4e1814b4697b60605a" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1656351823268-D30KZI3NJ5JL4IKI2JYU/IMG_1724.jpg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      

        
          
            
              
                <img class="thumb-image" elementtiming="system-gallery-block-slideshow" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1656351974342-MFJSYOUJQUBTRUT4OTMM/enigma.jpg" data-image-dimensions="1217x1624" data-image-focal-point="0.5,0.5" alt="enigma.jpg" data-load="false" data-image-id="62b9ec4ee0296d6409699d2f" data-type="image" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1656351974342-MFJSYOUJQUBTRUT4OTMM/enigma.jpg?format=1000w" /><br>
              

              
                
              
              
            
          
          
        

        

        

      
    
  

  




  

    
      
          

        

        
      
          

        

        
      
    

  








  <h2>After the Keynote</h2><p class="">The momentum did not end when the lights came up.</p><p class="">In the weeks that followed, Merryl’s story appeared in Wired, Dark Reading, podcasts, and international publications. The cybersecurity community embraced it. What had begun as a conversation at a dinner table was now part of a broader dialogue about creativity, courage, and the unexpected paths that shape our field.</p><p class="">Conversations that began backstage extended well beyond the conference. Relationships formed. Invitations followed. History reached new audiences.</p><p class="">Years later, as Merryl prepares to publish her book, it is striking to look back at where this chapter of the journey began. Not on a stage. Not in a newsroom. But at a birthday party, where a story was simply shared among new friends.</p>





















  
  



<hr />


  <h2>References/Appearances</h2><p class=""><a href="https://www.wired.com/story/merryl-goldberg-music-encryption-ussr-phantom-orchestra/" target="_blank">Wired - How a Saxophonist Tricked the KGB by Encrypting Secrets in Music</a> June 8, 2022</p><p class=""><a href="https://www.rsaconference.com/usa/agenda/session/How%20a%20Musician%20Used%20Sheet%20Music%20Encryption%20to%20Help%20Soviet%20Defectors" target="_blank">RSA Conference 2022 Keynote - How a Musician Used Sheet Music Encryption to Help Soviet Defectors</a> June 8, 2022</p><p class=""><a href="https://www.darkreading.com/edge-articles/how-4-young-musicians-hacked-sheet-music-to-help-fight-the-cold-war" target="_blank">Dark Reading - How 4 Young Musicians Hacked Sheet Music to Help Fight the Cold War</a> June 10, 2022</p><p class=""><a href="https://twitter.com/CISAJen/status/1535251261141962757?s=20&amp;t=vQy5WNVAluVjJ1BUXEVaEA" target="_blank">Tweet by CISAJen</a> June 10, 2022</p><p class=""><a href="https://podcasts.apple.com/us/podcast/the-phantom-orchestra/id1049420219?i=1000566604857" target="_blank">Hacked Podcast - The Phantom Orchestra</a> June 16, 2022</p><p class="">[PODCAST] <a href="https://www.smashingsecurity.com/279" target="_blank">Smashing Security Podcast #279: Encrypted notes and a deadly case of AirTag syping</a> June 16, 2022</p><p class=""><a href="https://www.spamchronicles.com/the-story-of-the-saxophonist-who-got-the-kgb-to-use-her-scores-as-code-korii/">SpamChronicles</a> June 20, 2022</p><p class=""><a href="https://jack.canalplus.com/articles/lire/l-histoire-de-merryl-goldberg-saxophoniste-americaine-qui-a-trompe-le-kgb-en-cryptant-ses-partitions" target="_blank">JACK article (French) </a>June 22, 2022</p><p class="">[VIDEO] <a href="https://www.youtube.com/watch?t=8s&amp;v=1WJQFESWLjg" target="_blank">Dr. Goldberg's RSA Conference presentation on YouTube</a> August 12, 2022</p><p class="">[PODCAST] <a href="https://podcasts.apple.com/us/podcast/29-the-musicians-who-came-in-from-the-cold/id1225077306?i=1000577063088" target="_blank">Click Here podcast: The Musicians Who Came In From The Cold</a> August 23, 2022 </p><p class="">[VIDEO] <a href="https://www.youtube.com/watch?v=a4yaoxYnNq4" target="_blank">A Reunion Performance from the “Phantom West" </a>August 23, 2022 </p><p class="">[VIDEO] <a href="https://www.youtube.com/watch?t=1s&amp;v=hsBrLdkK5OI" target="_blank">Evading the KGB with Sheet Music with Merryl Goldberg</a> August 25, 2022</p><p class="">[PODCAST] <a href="https://theworld.org/programs/world/iaea-inspectors-visit-zaporizhzhia-nuclear-plant" target="_blank">NPR podcast and radio show, The World</a> (starts at 23:40) August 29, 2022</p><p class="">[VIDEO PODCAST] <a href="https://www.youtube.com/watch?v=75XIGprSGWM">Spying Through Music</a> September 28, 2022</p><h2>Other References</h2><p class="">[VIDEO] <a href="https://www.adventurersclub.org/events/evading-the-kgb-with-sheet-music-with-merryl-goldberg/" target="_blank">Professor Packs a Punch: Beyond the Classroom with Merryl Goldberg</a> April 19, 2018</p><p class=""><a href="https://mobile.twitter.com/merrylgoldberg" target="_blank">Merryl Goldberg on Twitter</a></p><p class=""><a href="https://www.csusm.edu/sofa/archive/2018/about-dept/faculty/goldberg.html" target="_blank">Merryl Goldberg, Ed.D Faculty Page at CSUSM</a></p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1656549493856-7X4CTY6YR1CHT5PJR377/IMG_1532.jpeg?format=1500w" medium="image" isDefault="true" width="1500" height="1125"><media:title type="plain">A Birthday Party, a Cold War Cipher, and the RSA Stage</media:title></media:content></item><item><title>NetBOM</title><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 28 Dec 2021 18:52:00 +0000</pubDate><link>https://www.betweenthehacks.com/blog/what-is-netbom</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:61cbd940a6f0cf0be146bf3f</guid><description><![CDATA[NetBOM, short for Network Bill of Materials, is a concept I drafted to 
improve IoT and network security. This post explains how NetBOM works, what 
it includes, and how it supports Zero Trust strategies.]]></description><content:encoded><![CDATA[<h2>What is NetBOM? </h2><p class="">A NetBOM is a network bill of materials. It is a list of the Internet servers that a device needs to connect to. Currently, when we buy products, we connect them to our network and give them unfettered access to the Internet. This means that even if a device is behind a firewall, if it becomes infected with malware, the malware can connect out through the firewall to communicate with a threat actor. One way to limit this, it to create firewall rules that only allow the device to connect to the servers that it needs to connect to. </p><p class="">The NetBOM can be an important tool in implementing devices in a zero-trust environment.</p><p class="">The name is a play on the term SBOM which is a software bill of materials. An SBOM is an inventory for software that make up software components. This is similar to the list of ingredients that we see on food products, except the SBOM would list software components and their versions. </p><p class="">While an SBOM informs end users of the software and versions that are running on their devices, a NetBOM informs the end user of the Internet servers that the device needs to connect to. </p><h2>What is in the NetBOM?</h2><p class="">The NetBOM file includes:</p><ul data-rte-list="default"><li><p class="">Version number of the NetBOM file</p></li><li><p class="">Date of release</p></li><li><p class="">NetBOM server address(s) - this is where the device can get updates to the NetBOM</p></li><li><p class="">IP addresses and ports of Internet servers that are used by the device and an explanation of the purpose of the server</p><ul data-rte-list="default"><li><p class="">e.g. 9.9.9.9:9953, 9.9.9.9:53, DNS servers</p></li></ul></li><li><p class="">Fully qualified domain name addresses and ports (if necessary) of Internet servers that are used by the device</p><ul data-rte-list="default"><li><p class="">e.g. https://dns.quad9.net/dns-query, tls://dns.quad9.net, DNS servers</p></li></ul></li></ul><p class="">The NetBOM could include addresses for:</p><ul data-rte-list="default"><li><p class="">NetBOM server</p></li><li><p class="">SBOM and vendor patch servers</p></li><li><p class="">cloud-hosting servers</p></li><li><p class="">time servers</p></li><li><p class="">advertising servers</p></li><li><p class="">mapping servers (e.g. Google Maps)</p></li><li><p class="">API servers</p></li></ul><p data-rte-preserve-empty="true" class=""></p><h2>How is the NetBOM used?</h2><h3>Vendor:</h3><p class="">NetBOM file:</p><ul data-rte-list="default"><li><p class="">The vendor includes the NetBOM file in the device before the device is sold.</p></li><li><p class="">The NetBOM file is signed with the vendor’s code signing certificate.</p></li><li><p class="">The device will not load a NetBOM unless the file is signed with the vendor’s code signing certificate.</p></li><li><p class="">If any changes are necessary, the vendor changes the NetBOM file and adds the new version to their NetBOM server</p></li></ul><p class="">NetBOM server:</p><ul data-rte-list="default"><li><p class="">The vendor hosts a NetBOM server (e.g. netbom.domain.com) that serves updated versions of the NetBOM. This is important because some vendors may change hosting servers over time. </p></li><li><p class="">The NetBOM server uses the current standard for secure hosting (e.g. TLS/HTTPS) </p><ul data-rte-list="default"><li><p class="">The domain name used by the NetBOM server must be owned by the vendor</p></li><li><p class="">Hosting certificates must be registered to the vendor by a trusted third-party</p></li></ul></li></ul><h3>End-User:</h3><p class="">The end-user can use the NetBOM information to create rules in firewalls and security tools that will limit the ability of the device to only the Internet servers that are needed and approved by the vendor and the end-user.</p><h2>Possible NetBOM Automation</h2><p class="">Here are some possible ways to automate NetBOM which could be useful for small office and home use, where network security expertise is limited or non-existent. </p><ul data-rte-list="default"><li><p class="">A device can publish it’s NetBOM with the firewall.</p></li><li><p class="">A firewall would verify the validity of the NetBOM with the NetBOM server and create firewall rules based on the NetBOM.</p></li><li><p class="">Proxy servers could create rules based on the NetBOM</p></li><li><p class="">IPS and security tools can also create rules based on the NetBOM and report on anomalies.</p></li></ul><p data-rte-preserve-empty="true" class=""></p>]]></content:encoded><media:content type="image/jpeg" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1643408688103-WKM7FBN8ELZ0IGQZBLJH/NetBOM-logo-horizontal-color-bg.jpg?format=1500w" medium="image" isDefault="true" width="1500" height="1068"><media:title type="plain">NetBOM</media:title></media:content></item><item><title>log4shell</title><category>Cybersecurity News</category><category>Tips &amp; Best Practices</category><dc:creator>Chuck Davis</dc:creator><pubDate>Tue, 14 Dec 2021 18:56:34 +0000</pubDate><link>https://www.betweenthehacks.com/blog/log4shell</link><guid isPermaLink="false">52ae955ce4b04f67f91b6df5:54aae3e9e4b041b86b038185:61b798c25290441e82a003d4</guid><description><![CDATA[UPDATED December 16, 2021

If you are reading this, you likely have heard about Log4Shell, the 
December, 2021 critical zero-day remote-code execution vulnerability in the 
popular Log4j software library that is developed and maintained by the 
Apache Software Foundation. Apache has patched this vulnerability in 
version 2.15.0, however vendors who use this library will need to…]]></description><content:encoded><![CDATA[<p class="">Last Update: December 28, 2021</p><p class="">If you are reading this, you likely have heard about Log4Shell, the December, 2021 critical zero-day remote-code execution vulnerability, and subsequent vulnerabilities in the popular Log4j software library that is developed and maintained by the <a href="https://logging.apache.org/log4j/2.x/" target="_blank">Apache Software Foundation</a>. Apache has patched these vulnerabilities in <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank">version 2.17.1,</a> however vendors who use this library will need to patch their affected systems. Amit Yoran, CEO of the cybersecurity firm <a href="https://www.theguardian.com/technology/2021/dec/10/software-flaw-most-critical-vulnerability-log-4-shell" title="https://www.theguardian.com/technology/2021/dec/10/software-flaw-most-critical-vulnerability-log-4-shell"><span>Tenable, called it</span></a> “the single biggest, most critical vulnerability of the last decade” – and possibly the biggest in the history of modern computing. In addition to the remote-code execution capabilities of this vulnerability, one of the reasons this is so critical, is that Log4j is being used in systems all over the Internet that will not be updated automatically. </p><p class=""><a href="https://twitter.com/eastdakota/status/1469800951351427073" target="_blank">According to Matthew Prince</a>, the CEO of cybersecurity company, Cloudflare, the earliest evidence of exploitation was on December 1, 2021, which was 9 days before the vulnerability was publicly disclosed but since the disclosure, the flaw is being widely exploited in the wild.</p><h2>Which Versions of log4j are vulnerable?</h2><ul data-rte-list="default"><li><p class="">Versions up to and including 2.0-beta9 to 2.14.0 are vulnerable to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank">CVE-2021-44228</a> (CVSS 10)</p></li><li><p class="">Versions up to and including  2.15.0 is vulnerable to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046" target="_blank">CVE-2021-45046</a> (CVSS 9.0)</p></li><li><p class="">Versions up to and including  2.16.0 is vulnerable to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45105" target="_blank">CVE-2021-45105</a> (CVSS 7.5)</p></li><li><p class="">Versions up to and including 2.17.0 are vulnerable to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832" target="_blank">CVE-2021-44832</a> (CVSS 6.6)</p></li></ul><p class="">Version 2.15.0 was released to patch the vulnerability but according to the Apache Software Foundation, “…the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations” so they issued <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046">CVE-2021-45046 </a>and released version 2.16.0. </p><p class="">Version 2.16.0 was originally rated as low severity CVSS 3.7 but this has been changed to a critical severity 9.0 score when it was shown that an attacker could abuse the vulnerability and execute code remotely. </p><p class="">Version 2.17.0 was released on Friday December 18 to patch a vulnerability in all previous versions of Log4j 2, which “…did not protect from uncontrolled recursion from self-referral lookups.” according to Apache.</p><p class="">Version 2.17.1 was released to patch a remote code execution vulnerability in all versions prior to and including 2.17.0. However, as of this writing, it seems that an attacker would need permission to modify the logging configuration file, so install this patch when you can. </p><p class="">NOTE: If you are running any version up to and including 2.16.0, upgrade to at least <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank">version 2.17.0</a> of Log4j as soon as possible and since you’re upgrading, you should probably just go right to 2.17.1.</p><p class="">As of the writing of this blog, there is no evidence that version 1 of Log4j is vulnerable to these CVEs, but running old, outdated software is not recommended so if you are using version 1, you should consider upgrading to at least <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank">version 2.17.0</a> of Log4j.</p><h2>How The Attack Works and How to Defend Against It</h2><p class="">In simple terms, an attacker can enter a specially crafted string into the input field of a java-hosted application that will be passed on to Log4j and executed, resulting in a system takeover.</p><p class="">It’s actually a little more complicated than that, so to show how this attack could be implemented, and prevented, here is a brief overview of a <a href="https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/" target="_blank">blog</a> that was written by the Swiss Government Computer Emergency Response Team (CERT).</p><h3>Stage 1</h3><ul data-rte-list="default"><li><p class="">Attack: An attacker inserts a JNDI lookup in the header field of an input that is likely to be logged</p></li><li><p class="">Defense: Block with a Web Application Firewall (WAF)</p></li></ul><h3>Stage 2</h3>


































































  

    
  
    

      

      
        <figure class="
              sqs-block-image-figure
              intrinsic
            "
        >
          
        
        

        
          
            
          
            
                
                
                
                
                
                
                
                <img data-stretch="false" data-image="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg" data-image-dimensions="728x491" data-image-focal-point="0.5,0.5" alt="" data-load="false" elementtiming="system-image-block" src="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=1000w" width="728" height="491" sizes="(max-width: 640px) 100vw, (max-width: 767px) 100vw, 100vw" onload="this.classList.add(&quot;loaded&quot;)" srcset="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=100w 100w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=300w 300w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=500w 500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=750w 750w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=1000w 1000w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=1500w 1500w, https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/d0ef077c-26bd-4fe6-9ffc-430d05e137b9/log4j-diagram.jpeg?format=2500w 2500w" loading="lazy" decoding="async" data-loader="sqs">

            
          
        
          
        

        
          
          <figcaption class="image-caption-wrapper">
            <p class="">Image from Swiss Government Computer Emergency Response Team <a href="https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/">https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/</a> </p>
          </figcaption>
        
      
        </figure>
      

    
  


  





  <ul data-rte-list="default"><li><p class="">Attack: The JNDI string is passed to Log4j for logging</p></li><li><p class="">Defense: Disable or patch Log4j</p></li></ul><h3>Stage 3</h3><ul data-rte-list="default"><li><p class="">Attack: Log4j interpolates the string and queries the malicious LDAP server</p></li><li><p class="">Defense: Disable JNDI lookups</p></li></ul><h3>Stage 4</h3><ul data-rte-list="default"><li><p class="">Attack: The LDAP server responds with directory information that contains the malicious Java class</p></li><li><p class="">Defense: None</p></li></ul><h3>Stage 5</h3><ul data-rte-list="default"><li><p class="">Attack: Java deserializes (or downloads) the malicious Java class and executes it</p></li><li><p class="">Defense: Disable remote codebases</p></li></ul><p class="">For a more in-depth dive, this <a href="https://nakedsecurity.sophos.com/2021/12/13/log4shell-explained-how-it-works-why-you-need-to-know-and-how-to-fix-it/" target="_blank">Naked Security blog</a> provides a great technical walk-through of the the exploit and how to mitigate a vulnerable system.</p><p class="">This is the type of vulnerability that will take months or years to effectively mitigate across the Internet. To stay informed and follow the latest developments, you can reference the <a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" target="_blank">CISA Log4j Guide</a> or review the additional references at the end of this blog.</p><p class="">If you are testing systems to see if they are vulnerable, Huntress Labs created a <a href="https://log4shell.huntress.com" target="_blank">Log4Shell vulnerability testing page</a>. This won’t execute code but still be sure you have permission to test your target system.</p><h2>Call for SBOM</h2><p class="">The past four days have been very busy for IT Security and IT teams around the world. Part of the problem with responding quickly is that most organizations have a poor inventory of the systems and software that exist in their enterprise. Even organizations who are good at keeping inventory will likely struggle to manage this vulnerability because so many of the products and services that we use are made up of a combination of open source and proprietary software but vendors tend not to reveal the code that they use. If vendors were required to share a Software Bill of Materials (SBOM), then organizations would be able to take a quick inventory of the software that runs in, and supports, their enterprise and make quick risk assessments to determine what is vulnerable and how to mitigate the risks.</p><p class="">While SBOMs are not widely available and used today, there are efforts to move in this direction. Earlier this year, President Biden signed an <a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/" target="_blank">executive order</a> that called for the U.S. government to publish minimum elements for an SBOM. You can learn more about this effort from the National Telecommunications and Information Administration’s (NTIA) SBOM <a href="https://ntia.gov/SBOM" target="_blank">site</a>. Additionally, CISA is hosting a 2-day webinar called <a href="https://www.cisa.gov/cisa-sbom-rama" target="_blank">SBOM-A-RAMA on December 15th and 16th, 2021</a>.</p><h2>References:</h2><ul data-rte-list="default"><li><p class=""><a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance" target="_blank">CISA Log4j Guide </a></p></li><li><p class=""><a href="https://github.com/cisagov/log4j-affected-db" target="_blank">CISA Log4j Affected Product Database</a></p></li><li><p class=""><a href="https://www.govcert.ch/blog/zero-day-exploit-targeting-popular-java-library-log4j/" target="_blank">Swiss Government CERT: Zero-Day Exploit Targeting Popular Java Library Log4j</a></p></li><li><p class=""><a href="https://nakedsecurity.sophos.com/2021/12/13/log4shell-explained-how-it-works-why-you-need-to-know-and-how-to-fix-it/" target="_blank">Naked Security: Log4Shell explained - how it works, why you meed to know, and how to fix it</a> </p></li><li><p class="">Log4shell Repo: <a href="https://github.com/NCSC-NL/log4shell" target="_blank">Great repo of operational information about log4shell, including a list of vulnerable software</a></p></li><li><p class=""><a href="https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592" target="_blank">Blue Team Cheat Sheet Log4Shell</a></p></li><li><p class=""><a href="https://www.techsolvency.com/story-so-far/cve-2021-44228-log4j-log4shell/" target="_blank">Cheat Sheet and Reference Guide</a> </p></li><li><p class=""><a href="https://unit42.paloaltonetworks.com/apache-log4j-vulnerability-cve-2021-44228/" target="_blank">Another Apache Log4j Vulnerability Is Actively Exploited in the Wild (CVE-2021-44228)</a> </p></li><li><p class=""><a href="https://ntia.gov/SBOM" target="_blank">National Telecommunications and Information Administration’s (NTIA) SBOM site</a></p></li><li><p class=""><a href="https://www.cisa.gov/cisa-sbom-rama" target="_blank">CISA’s SBOM-A-RAMA</a></p></li><li><p class=""><a href="https://log4shell.huntress.com" target="_blank">Huntress Labs: Open source Log4Shell vulnerability testing page</a></p></li><li><p class=""><a href="https://www.bleepingcomputer.com/news/security/log4j-list-of-vulnerable-products-and-vendor-advisories/" target="_blank">Bleeping Computer: List of Vulnerable Products and Vendor Advisories</a></p></li><li><p class=""><a href="https://www.securityweek.com/log4shell-tools-and-resources-defenders-continuously-updated" target="_blank">SecurityWeek: Log4Shell Tools and Resources for Defenders</a></p></li><li><p class=""><a href="https://github.com/yahoo/check-log4j" target="_blank">check-log4j: This tool will try to determine if the host it is running on is likely vulnerable</a></p></li><li><p class=""><a href="https://thehackernews.com/2021/12/apache-issues-3rd-patch-to-fix-new-high.html" target="_blank">The Hacker News: Apache Issues 3rd Pact to Fix New High-Severity Log4j Vulnerability</a></p></li><li><p class=""><a href="https://www.cisecurity.org/log4j-zero-day-vulnerability-response/" target="_blank">Center for Internet Security Log4j Response Page</a></p></li><li><p class=""><a href="https://github.com/cisagov/log4j-scanner" target="_blank">CISA Log4j Scanning tool</a></p></li></ul><h2>Change Log</h2><ul data-rte-list="default"><li><p class="">December 28,2021 Added <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832" target="_blank">CVE-2021-44832</a>  </p></li><li><p class="">December 22, 2021: Added link to CISA log4j scanning tool</p></li><li><p class="">December 20, 2021: Added CISA Log4j Affected Product Database</p></li><li><p class="">December 18, 2021: Added information about CVE-2021-45105 and link to The Hacker News article covering the CVE</p></li><li><p class="">December 17, 2021: Added link to the check-log4j script </p></li><li><p class="">December 16, 2021 - Added information about CVE-2021-450446, added links to BleepingComputer and SecuirtyWeek </p></li><li><p class="">December 15, 2021 - Added Log4Shell Repo link and Huntress Labs Log4Shell testing page</p></li></ul>]]></content:encoded><media:content type="image/png" url="https://images.squarespace-cdn.com/content/v1/52ae955ce4b04f67f91b6df5/1640376807982-U2LCIBQ7CSTIZHPI9LPU/log4j_BTH_logo2_vector_transbg.png?format=1500w" medium="image" isDefault="true" width="1500" height="971"><media:title type="plain">log4shell</media:title></media:content></item></channel></rss>