<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Yaksas Security]]></title><description><![CDATA[Cybersecurity Research]]></description><link>https://www.yaksas.com</link><image><url>https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png</url><title>Yaksas Security</title><link>https://www.yaksas.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 03 May 2026 10:57:53 GMT</lastBuildDate><atom:link href="https://www.yaksas.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Yaksas Security]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yaksas@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yaksas@substack.com]]></itunes:email><itunes:name><![CDATA[Yaksas Security]]></itunes:name></itunes:owner><itunes:author><![CDATA[Yaksas Security]]></itunes:author><googleplay:owner><![CDATA[yaksas@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yaksas@substack.com]]></googleplay:email><googleplay:author><![CDATA[Yaksas Security]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[MOVED: Mona.py for exploit devs: 6 must know commands]]></title><description><![CDATA[Moved: Mona.py for exploit devs: 6 must know commands]]></description><link>https://www.yaksas.com/p/monapy-for-exploit-devs-6-commands</link><guid isPermaLink="false">https://www.yaksas.com/p/monapy-for-exploit-devs-6-commands</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sat, 19 Oct 2024 05:40:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post has been moved to </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184569780,&quot;url&quot;:&quot;https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;Mona.py for exploit devs: 6 must know commands&quot;,&quot;truncated_body_text&quot;:&quot;When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration.&quot;,&quot;date&quot;:&quot;2024-10-19T17:41:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Mona.py for exploit devs: 6 must know commands</div></div><div class="embedded-post-body">When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 years ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item><item><title><![CDATA[MOVED: Seven Common Cryptography Attacks]]></title><description><![CDATA[MOVED: Seven Common Cryptography Attacks]]></description><link>https://www.yaksas.com/p/seven-common-cryptography-attacks</link><guid isPermaLink="false">https://www.yaksas.com/p/seven-common-cryptography-attacks</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 18 Oct 2024 09:34:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post has been moved to </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184760285,&quot;url&quot;:&quot;https://www.udaymittal.com/p/seven-common-cryptography-attacks&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;Seven Common Cryptography Attacks&quot;,&quot;truncated_body_text&quot;:&quot;Cryptography, the cornerstone of data security, is under constant threat from attackers employing various techniques to crack encrypted data. In this article, we explore seven prominent cryptographic attacks and how they exploit weaknesses in cryptographic systems.&quot;,&quot;date&quot;:&quot;2024-10-18T09:45:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/seven-common-cryptography-attacks?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Seven Common Cryptography Attacks</div></div><div class="embedded-post-body">Cryptography, the cornerstone of data security, is under constant threat from attackers employing various techniques to crack encrypted data. In this article, we explore seven prominent cryptographic attacks and how they exploit weaknesses in cryptographic systems&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 years ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item><item><title><![CDATA[MOVED: The Data Breach That Changed Everything]]></title><description><![CDATA[MOVED: The Data Breach That Changed Everything]]></description><link>https://www.yaksas.com/p/the-data-breach-that-changed-everything</link><guid isPermaLink="false">https://www.yaksas.com/p/the-data-breach-that-changed-everything</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Wed, 09 Oct 2024 06:54:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184840650,&quot;url&quot;:&quot;https://www.udaymittal.com/p/the-data-breach-that-changed-everything&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;The Data Breach That Changed Everything&quot;,&quot;truncated_body_text&quot;:&quot;The 2013 Target data breach stands as one of the most impactful cybersecurity incidents in the history, not just because of its scale, but due to the profound changes it brought to how businesses handle cybersecurity. The breach exposed the personal information, including credit and debit card data, of over&quot;,&quot;date&quot;:&quot;2026-01-17T05:04:31.376Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/the-data-breach-that-changed-everything?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Data Breach That Changed Everything</div></div><div class="embedded-post-body">The 2013 Target data breach stands as one of the most impactful cybersecurity incidents in the history, not just because of its scale, but due to the profound changes it brought to how businesses handle cybersecurity. The breach exposed the personal information, including credit and debit card data, of over&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">3 months ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item><item><title><![CDATA[Where Should a CISO Report in an Organization?]]></title><description><![CDATA[Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity program.]]></description><link>https://www.yaksas.com/p/where-should-a-ciso-report-in-an</link><guid isPermaLink="false">https://www.yaksas.com/p/where-should-a-ciso-report-in-an</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sat, 05 Oct 2024 04:30:59 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/53e4ff6f-9d01-4458-bd14-656121a6433a_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Organisations are often faced with the challenge of deciding where the Chief Information Security Officer (CISO) should report within the corporate structure. This decision is not a one-size-fits-all and depends on factors such as the size of the organization, the industry, regulatory requirements, and how deeply ingrained cybersecurity is in the company&#8217;s operations.</p><p>The placement of a CISO within the organization significantly affects how cybersecurity risks are managed and addressed. If a CISO is buried deep within the organizational hierarchy, the risks associated with cybersecurity may be diluted or misunderstood by multiple layers of management. These risks could eventually lose urgency or visibility before reaching decision-makers. For a cybersecurity program to be effective, the CISO must have a direct line to senior leadership, ensuring cybersecurity risks are treated with the gravity they deserve.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Reporting to Chief Legal Counsel</h4><p>In some organizations, particularly those dealing with heavy compliance requirements, the CISO may report to the Chief Legal Counsel. This setup can be advantageous, especially when cybersecurity and legal compliance are tightly linked. However, not every organization has a dedicated legal counsel or sees the value in tying security to the legal function. For companies that do, this reporting structure ensures that the CISO has a legal perspective on data breaches, cyber risks, and compliance, which can be critical in regulated industries. However, without a strong understanding of technology, this arrangement can also slow down security decision-making. Another disadvantage of this reporting structure is that it may make the cybersecurity function more compliance focused.</p><h4>Reporting to the CIO</h4><p>Another common reporting structure is for the CISO to report to the Chief Information Officer (CIO). While this might seem logical at first glance, given the CIO&#8217;s responsibility for the organization&#8217;s technology landscape, it can create a conflict of interest. The CIO&#8217;s primary role is to drive innovation and ensure that IT systems meet business demands. This often involves implementing new features and technologies, which can conflict with the CISO&#8217;s need to prioritize security, sometimes slowing down or complicating the development process. The pressure to prioritize business goals over security concerns can be significant in this reporting line, which might lead to compromised cybersecurity protocols.</p><h4>Reporting to the Chief Risk Officer</h4><p>The Chief Risk Officer (CRO) is another potential reporting line for the CISO, especially in organizations where risk management is a central business function. Reporting to the CRO allows cybersecurity to be viewed through a broader risk management lens, ensuring that cybersecurity risks are balanced with other operational and financial risks. However, many organizations do not have a dedicated CRO, making this a less common reporting line. Still, this setup aligns cybersecurity with the organization's overall risk strategy, which can be particularly useful in industries such as finance.</p><h4>Reporting to Internal Audit</h4><p>Some organizations place the CISO within the internal audit department, but this setup often involves a serious conflict of interest. The internal audit team is responsible for independently assessing the effectiveness of internal controls, including cybersecurity measures. If the CISO reports to internal audit, there may be pressure to downplay security issues during audits, which could compromise the integrity of the cybersecurity program. Therefore, while this structure may offer a sense of oversight, it can be problematic in practice.</p><h4>Reporting to the CEO</h4><p>One of the most effective reporting structures for a CISO is directly to the CEO. This gives the CISO a voice at the highest level of the organization, ensuring that cybersecurity is treated as a business issue rather than just a technical one. In this structure, the CISO can work closely with other executive leaders, and decisions on security measures can be aligned with overall business objectives. The primary benefit here is that the CISO&#8217;s influence is maximized, and the importance of cybersecurity is embedded into the business strategy from the top down. The downside of this reporting structure is that the CEO may already be preoccupied with other business priorities.</p><h4>Tailoring the Reporting Structure to the Organization</h4><p>Ultimately, the optimal reporting structure for a CISO depends on the specific needs of the organization. Industry trends, business goals, and regulatory requirements will heavily influence the decision. For example, companies in heavily regulated industries like finance, healthcare, or defense might benefit from placing the CISO closer to legal or risk management functions. In contrast, organizations with a significant focus on innovation and growth may find it more appropriate to have the CISO report directly to the CEO or the CIO, with proper safeguards to avoid conflicts of interest.</p><p>In all cases, the success of the CISO depends not only on where they report but also on the relationships they build across departments. A CISO who can foster trust and collaboration with peers and senior executives will have far more success in implementing effective cybersecurity measures, regardless of where they sit within the organizational chart. Therefore, while organizational structure is important, the CISO&#8217;s ability to communicate and influence at all levels is often the largest predictor of success.</p><p>Are there any reporting structures for a CISO that you believe should be avoided entirely? Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success]]></title><description><![CDATA[A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk management.]]></description><link>https://www.yaksas.com/p/how-cisos-and-corporate-audit-teams</link><guid isPermaLink="false">https://www.yaksas.com/p/how-cisos-and-corporate-audit-teams</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Wed, 02 Oct 2024 16:31:13 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e4643c9d-6a94-4f97-8f70-c06b9da3f140_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>One of the most critical partnerships a Chief Information Security Officer (CISO) can cultivate within an organization is with the corporate audit team. This collaboration can significantly influence cybersecurity&#8217;s visibility and the success of securing executive buy-in and funding for the cybersecurity program. At the same time, the audit team benefits from the partnership by staying ahead in understanding and mitigating cybersecurity risks, avoiding being outmatched by system owners and smart engineers.</p><h4>The Power of Collaboration</h4><p>The corporate audit team and cybersecurity team share a common goal: protecting the organization from financial, operational, and compliance risks. By actively partnering with the audit team, a CISO can better align cybersecurity goals with broader risk management and compliance objectives, allowing both functions to complement each other effectively.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>For instance, one way a CISO can push their message across to senior executives and the board is by participating in the annual audit-planning process. When cybersecurity is integrated into the audit planning, it creates opportunities for risk areas to be identified early, allowing for more proactive mitigation efforts. By having the audit team focus on cybersecurity risks, it becomes easier to present cybersecurity not just as a technical issue but as a critical business risk that deserves executive attention and investment.</p><h4>Influence Through Data and Reporting</h4><p>The audit team has a direct line of communication with the board, especially concerning regulatory compliance and risk management. A partnership with the CISO allows for cybersecurity risk data to be included in audit reports, making it more likely to capture the attention of senior leadership. When the audit team highlights cybersecurity risks as part of its findings, it validates the CISO's message, lending credibility and urgency to funding requests and program expansions.</p><p>Take the case of a financial services firm that was initially struggling to secure funding for an enhanced cybersecurity program. The CISO collaborated with the audit team to include a detailed analysis of cyber risks in the annual audit report. When this data was presented to the board alongside financial compliance risks, the executives were more receptive to the cybersecurity budget increase, as they could clearly see the connection between cyber risks and overall business impact.</p><h4>Trust Is the Foundation</h4><p>For this partnership to work, trust between the CISO and the audit team is crucial. Both teams need to rely on each other for accurate, timely information and the sharing of insights. The audit team must trust the CISO&#8217;s technical assessments of risk, while the CISO needs to rely on the audit team to present a clear and business-aligned view of these risks to the board.</p><p>Building this trust takes time and consistent effort. A CISO can start by being transparent about cybersecurity challenges and working collaboratively on risk assessments. Similarly, the audit team can support the cybersecurity function by emphasising the importance of cybersecurity in their audit findings. This mutual support improves the ability to secure necessary resources and board approval for cybersecurity initiatives.</p><h4>Conclusion</h4><p>The partnership between the CISO and corporate audit team is a powerful way to strengthen an organization&#8217;s cybersecurity posture. By aligning objectives, sharing data, and building trust, both teams can better influence the board and executives, driving necessary changes and securing funding for critical cybersecurity initiatives.</p><p>In what ways can the audit team in your organization benefit from closer collaboration with the cybersecurity team? Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[CERT-In: The first responders of the Indian cyberspace]]></title><description><![CDATA[This post is part of our series Cybersecurity Chronicles from India. This one is all about the The Indian Computer Emergency Response Team (CERT-In).]]></description><link>https://www.yaksas.com/p/cert-in-the-first-responders-of-the</link><guid isPermaLink="false">https://www.yaksas.com/p/cert-in-the-first-responders-of-the</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Tue, 01 Oct 2024 10:38:40 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d5096c21-9dfe-48c2-abf2-989049d670c1_1600x960.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Think of CERT-In as the guardians of the Indian cyberspace. Their mission is to prevent and deal with cyber attacks across the Indian information technology infrastructure. This includes infrastructure belonging to Government, Public and Private entities. They are operational 24 hours, even during government and other holidays, combating cyber threats of different complexities.</p><p>The Indian Computer Emergency Response Team, aka CERT-In, was conceptualized as part of the Indian Information Technology Act 2000 <a href="https://www.indiacode.nic.in/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;sectionId=13102&amp;sectionno=70B&amp;orderno=93">(section 70B)</a>. It was formally established in 2004 under the Ministry of Communications and Information Technology with <a href="https://economictimes.indiatimes.com/news/politics-and-nation/gulshan-rai-becomes-first-chief-of-cyber-security-post-created-to-tackle-growing-e-threats/articleshow/46449780.cms?from=mdr">Dr. Gulshan Rai (former National Cybersecurity Co-coordinator)</a> as <a href="https://cert-in.org.in/PDF/Nomenclature_of_CERT-In.pdf">one of the first Director General</a>. This post is currently held by <a href="https://cert-in.org.in/">Dr. Sanjay Bahl</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>What are the primary responsibilities of CERT-In?</h2><p>Their primary responsibilities include (a detailed account of CERT-In's roles and responsibilities can be found on their <a href="https://www.cert-in.org.in/">website)</a>:</p><ul><li><p>Collection, analysis and dissemination of information on cyber incidents</p></li><li><p>Forecast and alerts of cyber security incidents</p></li><li><p>Emergency measures for handling cyber security incidents</p></li><li><p>Coordination of cyber incident response activities</p></li><li><p>Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents</p></li><li><p>Create awareness on cyber security issues through dissemination of information on its websites</p></li></ul><h2>What powers are conferred to CERT-In?</h2><p>The notification <a href="https://cert-in.org.in/PDF/G.S.R_20(E).pdf">G.S.R 20(E)</a>, dated 16 January 2014 confers certain powers upon CERT-In to fulfill it's responsibilities. These are (<em>note: the following list is written in simplified language. Reader is advised to read the notification document for verbatim text</em>):</p><ul><li><p>Certain officers of CERT-In may seek information from service providers, intermediaries, data centers, body corporate and any other person for carrying out it's functions.</p></li><li><p>It may collect and analyze information relating to cyber security incidents form individuals, organizations, and computer resources.</p></li><li><p>Under certain circumstances, it may disclose relevant information to stakeholders in national interests.</p></li><li><p>Issue directions or advisories to service providers, intermediaries, data centers, body corporate and any other person with a view to enhance the cybersecurity if the information infrastructure in the country. The service providers, intermediaries, data centers, body corporate and any other person will need to comply with these directions and advisories. Any non-compliance must be reported to CERT-In.</p></li><li><p>CERT-In may file a complaint before the court post review of the non-compliance report.</p></li><li><p>CERT-In may monitor and collect traffic data in accordance with the provisions of section 69B of the Information Technology Act, 2000 and Rules.</p></li></ul><h2>CERT-In in action</h2><ul><li><p>CERT-In handles an average of <strong>1 million+ security incidents</strong> during a year. These include phishing, unauthorized scans, vulnerable services, malware etc.</p></li><li><p>CERT-In has published <strong>1150+ advisories</strong> till date covering various enterprise, IoT, web, mobile and desktop software.</p></li><li><p>Cyber Swachhta Kendra tracked <strong>44,36,41,608 botnet/malware infections</strong> in India and notified end users in collaboration with Internet Service Providers and organizations.</p></li><li><p><a href="https://police.py.gov.in/CERT-In%20-%20Empanelled%20Information%20Security%20Auditing%20Organizations%20by%20CERT-In%20-%202021.pdf">CERT-In has </a><strong><a href="https://police.py.gov.in/CERT-In%20-%20Empanelled%20Information%20Security%20Auditing%20Organizations%20by%20CERT-In%20-%202021.pdf">empaneled 96 Information Security Auditing organizations</a></strong>, on the basis of stringent qualifying criteria, to carry out information security audit, including the vulnerability assessment and penetration test of the networked infrastructure of government and critical sector organizations.</p></li><li><p>CERT-In has conducted <strong>64 Cyber security exercises</strong> of different complexities, including table top exercises, with <strong>participation from about 800 organizations</strong> covering various sectors of Indian economy from Government/Public/Private.</p></li></ul><h2>How can one engage with CERT-In?</h2><p>CERT-In provides various avenues to engage with them:</p><ul><li><p>Organizations can <a href="https://cert-in.org.in/PDF/Report_Contribute.pdf">share cybersecurity incident and vulnerability information</a> with the Indian CERT to alert them about a potential cyber attack.</p></li><li><p>Organizations can also integrate CERT-In issued advisories and vulnerability notes in their threat intelligence feeds.</p></li><li><p>Companies operating in cybersecurity space can apply to <a href="https://cert-in.org.in/PDF/timeline_july_2020_Onwards.pdf">become CERT-In empaneled auditors</a>.</p></li><li><p>Individuals can go through various security guidelines available on their <a href="https://cert-in.org.in">website</a> to become more cyber aware and improve their cyber safety.</p></li><li><p>Professionals can participate in CERT-In facilitated trainings and workshops.</p></li></ul><h2>Recent milestones</h2><ul><li><p>In 2017, CERT-In established <a href="https://www.csk.gov.in/">Cyber Swachhta Kendra</a> for detection of compromised systems in India and to notify, enable cleaning and securing systems of end users to prevent further malware infections.</p></li><li><p>In 2020, CERT-Fin (or CSIRT-Fin) was established to provide focused cyber threat intelligence and monitoring to financial sector.</p></li><li><p>In 2021, CERT-In became the listed member in Task Force for Computer Security Incident Response Teams / Trusted Introducer (TF-CSIRT/TI).</p></li><li><p>In 2021, CERT-In was authorized by the CVE Program, as a CVE Numbering Authority (CNA) for vulnerabilities impacting all products designed, developed and manufactured in India.</p></li></ul><h2>International Collaborations</h2><p>Over the years, CERT-In has collaborated with agencies from various countries such as, Korea, Japan, Mauritius, USA, Australia, Singapore, Malaysia, UK, Vietnam, Uzbekistan, Bangladesh and Morocco. These collaborations included, participating in joint drill exercises, signing MoUs with other nation-specific CERTs, conducting trainings and workshops for delegates from other countries and membership in global agencies such as APCERT, FIRST, TF-CSIRT/T.</p><h2>Conclusion</h2><p>The Indian Computer Emergency Response Team was one of the first national agencies to be setup to address risks and threats to the Indian cyberspace. Over the last twenty years, the role of CERT-In as the guardians of the Indian cyberspace has evolved significantly, specially with the onset of massive cyber attacks such as Wanna Cry or Not Petya and life threatening games such as the <a href="https://yaksas.in/ycscblog/games-can-replayed-not-life-bury-blue-whale/">Blue Whale</a> game. The team, comprised of 70+ members, handles 1 million+ security incidents that if left unaddressed could impact 1.4 billion citizens of India.</p><p>Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[6 Ways to Cover Your Device's Camera]]></title><description><![CDATA[Have you ever wondered that somebody might be watching you though your device's camera? Stay safe with these 6 device camera cover hacks.]]></description><link>https://www.yaksas.com/p/6-ways-to-cover-your-devices-camera</link><guid isPermaLink="false">https://www.yaksas.com/p/6-ways-to-cover-your-devices-camera</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 30 Sep 2024 10:27:52 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f8884c02-b301-4475-95a1-b72f3669f879_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Have you ever wondered that somebody might be watching you through your laptop's webcam or smartphone's camera? Or that while your laptop or smartphone stays on, in your bedroom, somebody might be recording your each and every act? Cracking into device cameras has been around ever since they were commercialized. Most of the devices we use today have cameras embedded in them, wherever we go they follow. Thus, device cameras have become a tool of choice for cyber criminals to spy on someone.</p><p>There are many ways in which this problem could be tackled. You can unplug the webcam, puncture the lens or simply, cover it (works for both laptop and smartphone). The last one is less complex and easy to implement. It allows the use of device cameras without compromising one's privacy. Here are five free, do it yourself, and one paid way(s) to do this:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Scotch tape</h3><p>Scotch tape is a commonly used household item. It's translucent nature makes it a good cover for webcams and it keeps the beauty of laptop intact. Can be used as a permanent solution.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0nm2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0nm2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0nm2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg" width="300" height="197" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:197,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Webcam Cover: Scotch Tape&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Webcam Cover: Scotch Tape" title="Webcam Cover: Scotch Tape" srcset="https://substackcdn.com/image/fetch/$s_!0nm2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 424w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 848w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!0nm2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f16c23d-9e52-46bc-8c1e-4f95905bedda_300x197.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p> <strong>Webcam Covered with Scotch Tape</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iQIg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iQIg!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iQIg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png" width="300" height="185" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf5548e5-bf6a-4874-8d34-58849728edae_300x185.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:185,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Scotch Tape Privacy&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Scotch Tape Privacy" title="Scotch Tape Privacy" srcset="https://substackcdn.com/image/fetch/$s_!iQIg!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!iQIg!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf5548e5-bf6a-4874-8d34-58849728edae_300x185.png 1456w" sizes="100vw"></picture><div></div></div></a></figure></div><p><strong>Level of privacy provided by Scotch Tape</strong></p><h3>Post-it Notes</h3><p>Got a stack of post-it notes lying around? Here's another way they can be used. They provide better privacy than scotch tape and you can write short message as well (for example, 'Remove at your own risk'). Can be used while working at desks, bedroom etc. not advised for meetings or conferences though (unless you're okay with a post-it sticking out of your laptop screen).</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!6DZa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!6DZa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!6DZa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg" width="300" height="203" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:203,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Webcam cover: Post-it&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Webcam cover: Post-it" title="Webcam cover: Post-it" srcset="https://substackcdn.com/image/fetch/$s_!6DZa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 424w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 848w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!6DZa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda8130f3-c5cf-4220-a412-3db5ea540e34_300x203.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p> <strong>Webcam covered with a Post-it note</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!76Md!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!76Md!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!76Md!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!76Md!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!76Md!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!76Md!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png" width="300" height="185" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:185,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Post-it privacy&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Post-it privacy" title="Post-it privacy" srcset="https://substackcdn.com/image/fetch/$s_!76Md!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!76Md!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!76Md!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!76Md!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3e19b02a-c209-4ae1-9d19-07380d795bdb_300x185.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Level of privacy provided by a Post-it note</strong></p><h3>Piece of cloth</h3><p>In case of an emergency, any piece of cloth can be used as a webcam cover. Just place one over the webcam. It can be held at place by using paper or binder clips. In the image below, I've used a hand towel as webcam cover and binder clips to hold it. It's a bit sore on eyes but provides good privacy.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BLat!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BLat!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BLat!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BLat!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BLat!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BLat!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg" width="300" height="216" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:216,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Webcam Cover: Piece of cloth&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Webcam Cover: Piece of cloth" title="Webcam Cover: Piece of cloth" srcset="https://substackcdn.com/image/fetch/$s_!BLat!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 424w, https://substackcdn.com/image/fetch/$s_!BLat!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 848w, https://substackcdn.com/image/fetch/$s_!BLat!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!BLat!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28bbd616-5941-455d-9e23-c9a2db9a0cee_300x216.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Webcam covered with a piece of cloth</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kCyO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kCyO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kCyO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png" width="300" height="185" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:185,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Piece of cloth privacy&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Piece of cloth privacy" title="Piece of cloth privacy" srcset="https://substackcdn.com/image/fetch/$s_!kCyO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 424w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 848w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 1272w, https://substackcdn.com/image/fetch/$s_!kCyO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F24a9dc6a-6c97-495d-ae34-e0efbc9d8e7e_300x185.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Level of privacy provided by a piece of cloth</strong></p><h3>Tissue Paper</h3><p>Tissue paper is another common household item that could be used as a device camera cover. They provide decent privacy and can be used for short intervals (as they keep falling off the screen).</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!lMTy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!lMTy!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!lMTy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg" width="300" height="198" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:198,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Webcam Cover: Tissue Paper&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Webcam Cover: Tissue Paper" title="Webcam Cover: Tissue Paper" srcset="https://substackcdn.com/image/fetch/$s_!lMTy!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 424w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 848w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!lMTy!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6eff2123-1d23-4623-97d4-fca9bf6e56ba_300x198.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Webcam covered with tissue paper</strong></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gQe5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gQe5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 424w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 848w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 1272w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gQe5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png" width="300" height="184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:184,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Tissue paper privacy&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Tissue paper privacy" title="Tissue paper privacy" srcset="https://substackcdn.com/image/fetch/$s_!gQe5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 424w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 848w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 1272w, https://substackcdn.com/image/fetch/$s_!gQe5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7a9f2d44-b8d7-41aa-af60-d3b8ddbde723_300x184.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Level of privacy provided by a tissue paper</strong></p><h3>Cardboard</h3><p>Cardboard can be used to make creative webcam covers. The level of privacy provided is at par with that of a piece of cloth. Below is a sample design, created by the redditer Alhessar. <a href="https://ilovegreengrass.wordpress.com/2014/02/12/cover-the-camera/">Here's</a> another design and a detailed do it yourself tutorial created by Ilona of <a href="https://ilovegreengrass.wordpress.com/">I Love Green Grass</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4gEO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4gEO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 424w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 848w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 1272w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4gEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png" width="300" height="210" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:210,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Cardboard Webcam cover&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Cardboard Webcam cover" title="Cardboard Webcam cover" srcset="https://substackcdn.com/image/fetch/$s_!4gEO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 424w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 848w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 1272w, https://substackcdn.com/image/fetch/$s_!4gEO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F50ce4ec6-5281-41a5-84ad-3ceaeb1900b6_300x210.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Sample design of a cardboard webcam cover</strong></p><h3>Paid Webcam Covers</h3><p>There are ample of commercially available webcam covers (I find them a bit overpriced though). The one shown below, one from <a href="http://www.amazon.in/Webcam-Cover-Laptops-Computers-Smart/dp/B00AZ6I4OI/ref=pd_sim_147_5?ie=UTF8&amp;dpID=31ALj27OymL&amp;dpSrc=sims&amp;preST=_AC_UL160_SR160%2C160_&amp;psc=1&amp;refRID=14R1J5E7NT8JF3C0QGKN">C-Slide</a>,&nbsp;is the most commonly used design. In case you find yourself at a security conference, look out for goodies, these are usually included.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A8Td!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A8Td!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 424w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 848w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A8Td!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg" width="300" height="115" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:115,&quot;width&quot;:300,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Webcam cover from C-Slide&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Webcam cover from C-Slide" title="Webcam cover from C-Slide" srcset="https://substackcdn.com/image/fetch/$s_!A8Td!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 424w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 848w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!A8Td!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F12b17471-5594-4a92-8c01-ee3134d502dd_300x115.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>Webcam cover from C-Slide</strong></p><p>In the light of recent hacks, more and more people are using webcam covers to safeguard their privacy. Recently, it was revealed that Mark Zuckerberg, founder of Facebook, <a href="http://mashable.com/2016/06/21/mark-zuckerberg-webcam-cover/#ty17f6jt6EqY">uses tape to cover the webcam and microphones</a> of his laptop. It doesn't harm to take precautions, specially when they come at no cost. Also watch out for suspicious behavior of the webcam LED. It shouldn't be on if you're not using the webcam.</p><p>Got a device camera cover hack or design of your own? We'd love to hear about it. Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why Changing Your Password Every 90 Days May Soon Be Outdated]]></title><description><![CDATA[Are organisations shifting from frequent password changes to longer passwords? Learn about modern trends in password management and how leading companies are adapting.]]></description><link>https://www.yaksas.com/p/why-changing-your-password-every</link><guid isPermaLink="false">https://www.yaksas.com/p/why-changing-your-password-every</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 18:03:45 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d8a3db59-0caa-41b9-a40b-ea65ea9f197d_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the past, many organizations implemented stringent password policies, requiring employees to change their passwords every 90 days, with a minimum length of eight characters. This traditional approach was seen as a necessary layer of security in defending against password-related cyber threats. However, modern cybersecurity trends are shifting towards a new approach: longer passwords of 10+ characters, combined with less frequent password changes. Industry standards, real-world examples, and ongoing discussions in the cybersecurity space indicate that the former method may soon become outdated.</p><h4>Traditional vs. Modern Password Policies</h4><p>The traditional model for password management in organizations, which mandates frequent changes, stems from a belief that regularly updating passwords minimizes the chances of password-related breaches. The <a href="https://www.pcisecuritystandards.org/">PCI DSS (Payment Card Industry Data Security Standard)</a> has historically mandated regular password changes for environments handling sensitive financial information. Similarly, the <a href="https://www.iso.org/standard/27001">ISO/IEC 27001 standard</a>, a widely accepted information security framework, also advocated for password policies requiring regular updates.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>However, while frequent changes make sense in theory, they often lead to undesirable consequences in practice. Many users, faced with the burden of remembering numerous passwords, resort to weak password creation strategies, such as slight modifications to existing passwords, writing down passwords, or even using easily guessable patterns. This significantly undermines the strength of password security.</p><p>On the other hand, recent guidelines, such as the <a href="https://pages.nist.gov/800-63-3/sp800-63b.html">NIST Special Publication 800-63B</a>, suggest a shift toward long, complex passwords with less frequent changes. NIST recommends using passwords that are at least 8-12 characters long, with a preference for even longer passwords, and advises that passwords only need to be changed if there is evidence of compromise. This new approach reduces the frustration on users while maintaining strong security, as a longer password is much harder to crack through brute-force attacks.</p><h4>Industry Standards Supporting Long Passwords</h4><p>Industry standards have evolved to reflect the benefits of longer passwords and less frequent changes. <a href="https://pages.nist.gov/800-63-3/sp800-63b.html">NIST&#8217;s guidelines</a>, which are influential in the cybersecurity community, explicitly reject the frequent password change policy unless there is a suspected compromise. <a href="https://preteshbiswas.com/2023/01/08/iso-270012022-a-5-17-authentication-information/">ISO/IEC 27001 has also started acknowledging</a> that password length is more critical than password rotation.</p><p>The PCI DSS has remained more cautious but is slowly adapting to similar trends, <a href="https://www.intersecworldwide.com/blog/pci-dss-password-requirements">particularly in environments where multi-factor authentication (MFA) is in place</a>. MFA provides an additional security layer, making the need for frequent password changes less pressing.</p><h4>Real-World Adoption of New Trends</h4><p>Many large organizations have already embraced the shift toward longer passwords with infrequent changes. For instance, <a href="https://duo.com/decipher/microsoft-will-no-longer-recommend-forcing-periodic-password-changes#:~:text=Microsoft%20dropped%20the%20password%2Dexpiration,Microsoft%20will%20no%20longer%20recommend">Microsoft stopped recommending regular password changes in 2019</a>, aligning its policies with NIST guidelines. They recognized that frequently changing passwords was more likely to harm than help security, as users were more inclined to create weaker passwords when forced to remember new ones every few months.</p><p>Similarly, Google has been at the forefront of password policy evolution, pushing users towards stronger, longer passwords while also encouraging the use of MFA and password managers to simplify password management.</p><p>Another example is the <a href="https://www.ncsc.gov.uk/collection/passwords/updating-your-approach">UK&#8217;s National Cyber Security Centre (NCSC), which recommends that organizations focus on password length and complexity</a>, only requiring changes when evidence suggests a compromise. This approach aligns with the growing consensus that security can be improved by addressing password strength rather than frequency.</p><h4>Why the Change Matters</h4><p>Longer passwords with less frequent changes reduce the cognitive load on users while providing a robust defence against attacks such as brute-force attempts. Length is a critical factor in password strength, and attackers require significantly more time and resources to crack a long password. Furthermore, when users are not burdened with frequent password changes, they are less likely to take shortcuts like reusing or creating easily guessable passwords.</p><p>As organizations continue to adopt this modern approach, the pressure on users decreases, security improves, and the likelihood of password breaches decreases significantly. However, it's essential that these policies are coupled with other security measures, such as MFA, to provide a layered approach to cybersecurity.</p><p>Do you prefer a long password that you change less often, or do you feel more secure changing your password frequently? Why? Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[PoshC2: A Red Teamer's Notes]]></title><description><![CDATA[A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.]]></description><link>https://www.yaksas.com/p/poshc2-a-red-teamers-notes</link><guid isPermaLink="false">https://www.yaksas.com/p/poshc2-a-red-teamers-notes</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 11:08:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9aac3cc3-8bac-4c12-a8c3-93a0e4e29f28_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is an ongoing post containing my notes on PoshC2 usage.</p><h4>What is PoshC2?</h4><p><a href="https://github.com/nettitude/PoshC2">PoshC2</a> is a command and control software. It is used to carry out post-exploitation tasks such as persistence, privilege escalation, lateral movements etc. during penetration testing and red teaming exercises. It supports Python3, PowerShell (v2 and v5), C# and C++. The official documentation is available <a href="https://poshc2.readthedocs.io/en/latest/">here</a>.</p><p>All of PoshC2 functionality can be divided into five components:</p><p><strong>PoshC2 Server</strong> - Serves payloads that can be executed on target machine(s) and send a connection back to PoshC2. The server console also displays the output of command(s) executed on an implant. The server is written in Python.</p><p><strong>Implants Receiver</strong> - Listens for the incoming implant connections and aggregates them. It is also used to load modules and execute commands on a single, multiple or all implants.</p><p><strong>Payloads</strong> - Commands, shellcode, executable binaries that when executed on target machine(s) (aka implants) sends back a connection to Implant receiver. Payloads are developed using C#, Python, PowerShell, JavaScript, VBScript and support Windows, Linux (Python) and MacOS (Python).</p><p><strong>Implants - </strong>Target machine(s) connected to PoshC2.</p><p><strong>Modules - </strong>Scripts (PowerShell and Python) and executable binaries (C#) that help in conducting various post-exploitation tasks such as enumeration, privilege escalation, lateral movement, hash dump, port forwarding etc. A comprehensive list of modules is available <a href="https://github.com/nettitude/PoshC2/tree/master/resources/modules">here</a>.</p><h4>How to use?</h4><p>The following video shows how to get PoshC2 up and running quickly. It covers:</p><ul><li><p>Installation on Kali Linux 2020.2</p></li><li><p>Configuring PoshC2</p></li><li><p>Running Posh-server and implants receiver</p></li><li><p>Managing implants</p></li><li><p>Modules</p></li><li><p>Loading C# and PowerShell modules on an Implant</p></li><li><p>Running commands on an implant</p></li></ul><p>Read <a href="https://yaksas.in/ycscblog/purple-ad-active-directory-lab-environment/">this</a> to learn more about the lab environment used in this video.<br></p><h4>Useful Commands (C# Implants)</h4><p><strong>Selecting Implant(s)<br></strong></p><ul><li><p>To select a single implant, enter the ImplantID</p></li><li><p>To select multiple implants, enter a comma separated list of ImplantIDs</p></li><li><p>To select all implants, enter ALL</p></li></ul><p><strong>Quick Reference List of Commands</strong></p><p>Issue the following command when connected to an implant(s)</p><pre><code>help</code></pre><p><strong>Bypass AMSI</strong></p><pre><code>bypass-amsi</code></pre><p><strong>Upload files</strong></p><pre><code>upload-file &lt;source file path&gt; &lt;destination file path&gt;
Example: upload-file /usr/share/windows-binaries/nc.exe C:\Users\Public\nc.exe</code></pre><p><strong>Download files</strong></p><pre><code>download-file &lt;file path&gt;
Example: download-file 'C:\\Users\\Public\\supersecretdata.txt'</code></pre><p>This will save a copy of the target file in the PoshC2 project directory.</p><p><strong>List Modules</strong></p><p>To list implant specific modules, select an implant and issue the following command:</p><pre><code> listmodules</code></pre><p>To list all modules, issue the following command at implant selection prompt:</p><pre><code>listmodules</code></pre><p><strong>Load a C# Module</strong></p><pre><code>loadmodule &lt;module name&gt;
Example: loadmodule SharpView.exe</code></pre><p><strong>Load a PowerShell Module</strong></p><pre><code>pslo &lt;module name&gt; 
Example: pslo powerview.ps1</code></pre><p>You can also use loadmoduleforce to load modules.</p><p><strong>Execute a PowerShell Command</strong></p><pre><code>sharpps &lt;command&gt; 
Example: sharpps Get-ChildItem -Force -Recurse</code></pre><p><strong>Convert Username and Password to a PSCredentials object</strong></p><pre><code>sharpps [string]$userName = 'IND\user.ind02'
sharpps [string]$userPassword = 'Sup3rStr0ngP@ssw0rd'
sharpps [securestring]$secStringPassword = ConvertTo-SecureString $userPassword -AsPlainText -Force
sharpps [pscredential]$credObject = New-Object System.Management.Automation.PSCredential ($userName, $secStringPassword)</code></pre><p>After executing above commands, $credObject can be passed as a value to -Credential parameter in PowerShell commands which accept this parameter.</p><p><strong>Enumerate an Implant</strong></p><pre><code>ls-recurse &lt;directory path&gt;
Example:  ls-recurse C:\Users
get-userinfo
get-computerinfo
loadmodule Seatbelt.exe
seatbelt all
sharpup</code></pre><p><strong>Port Scan</strong></p><pre><code>portscan &lt;IP&gt; &lt;port&gt; &lt;delay-in-seconds&gt; &lt;max thread&gt;
Example: portscan "192.168.3.8" "1-1000" 1 100</code></pre>]]></content:encoded></item><item><title><![CDATA[The Three Command and Control Tiers]]></title><description><![CDATA[This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.]]></description><link>https://www.yaksas.com/p/the-three-command-and-control-tiers</link><guid isPermaLink="false">https://www.yaksas.com/p/the-three-command-and-control-tiers</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 11:02:05 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/dc99a628-691b-45d3-a5fd-cd4c20cec5b4_1280x720.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Adversary Emulation 101: Mimicking a real-world cyber attack</a>.</p><p>A well designed Command and Control (C2) infrastructure is critical to the success of an <a href="https://yaksas.in/ycscblog/what-is-adversary-emulation/">adversary emulation</a> exercise. During an engagement, established C2 sessions may get disconnected frequently. Whenever this happens, there might be a temptation to re-exploit the target and establish another C2 session. This is not only time consuming but also not recommended during an active engagement. For one, it can put the entire engagement at risk as re-exploitation may lead to unwanted consequences. To avoid this, C2 mechanisms are deployed in a layered (or tiered) manner.</p><h2>What are the three Command and Control tiers?</h2><p>C2 mechanisms are generally deployed into following three tiers:</p><ul><li><p><strong>Interactive</strong> - C2 mechanisms in this tier are used more frequently than others. They are primarily used for issuing commands, enumeration, scanning and data exfiltration. The callback time is usually within minutes. For example, C2 agents deployed on target machines.</p></li><li><p><strong>Short-Haul</strong> - C2 mechanisms in this tier are used to re-establish interactive mechanisms. The callback time is within 12-24 hours. For example, a cronjob that downloads the C2 agent and executes it every 12 hours.</p></li><li><p><strong>Long-Haul</strong>&nbsp; - C2 mechanisms in this tier are used to re-establish short-haul mechanisms. The callback time is 24 hours or more. This is the slowest mechanism of all three and should not be used for interactive purposes. For example, a start-up script to create the cronjob mentioned before.</p></li></ul><h2>What to keep in mind while deploying multiple C2 tiers?</h2><ul><li><p>Use a tier for it's intended purpose only. For example, a short-haul C2 mechanism should not be used to run commands interactively.</p></li><li><p>Use different C2 channels (HTTPS, DNS, SSH, SMB etc.) for different tiers. This will ensure that even if one channel gets blocked an alternate is available to use.</p></li><li><p>Use encryption to avoid detection via network security devices.</p></li><li><p>Minimize C2 callback volume wherever possible. This will help in avoiding unnecessary exposure.</p></li><li><p>Avoid dropping binaries on target machines as this may trigger the anti-malware solution and alert the Blue team.</p></li></ul><h3>Other posts in this series</h3><ul><li><p><a href="https://yaksas.com/p/what-is-adversary-emulation">What is adversary emulation?</a></p></li><li><p><a href="https://yaksas.com/p/red-team-operations-attack-lifecycle">Red Team Operations Attack Lifecycle</a></p></li><li><p><a href="https://yaksas.com/p/introduction-to-mitre-att-and-ck">Introduction to MITRE ATT&amp;CK Framework</a></p></li><li><p><a href="https://yaksas.in/ycscblog/poshc2-a-red-teamers-notes/">PoshC2: A Red Teamer&#8217;s Notes</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Introduction to MITRE ATT&CK Framework]]></title><description><![CDATA[This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.]]></description><link>https://www.yaksas.com/p/introduction-to-mitre-att-and-ck</link><guid isPermaLink="false">https://www.yaksas.com/p/introduction-to-mitre-att-and-ck</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:55:56 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/8806ef74-cc2a-47c6-ae3a-94694c5e6c69_800x258.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Red Team Adversary Emulation: Mimicking a real-world cyber attack</a>.</p><p>If you want to beat your adversaries, think like them. A common adage we have all heard. <a href="https://attack.mitre.org">MITRE ATT&amp;CK</a> is just that. A framework to think like adversaries and beat them in their game. It is a culmination of years of efforts of studying various cyber Adversaries' Tactics, Techniques and turning them into Common Knowledge (ATT&amp;CK).</p><h2>What is ATT&amp;CK framework?</h2><p>As per <a href="https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf">ATT&amp;CK's design and philosophy document</a>, ATT&amp;CK is a behavioral model that consists of the following core components:</p><ul><li><p>Tactics, denoting short-term, tactical adversary goals during an attack;</p></li><li><p>Techniques, describing the means by which adversaries achieve tactical goals;</p></li><li><p>Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques;</p></li><li><p>Documented adversary usage of techniques, their procedures,and other metadata;</p></li><li><p>Software, used by adversaries to implement a technique or a sub-technique; and</p></li><li><p>Mitigations, preventing adversaries from achieving their tactical goal by blocking the execution of a technique or a sub-technique.</p></li></ul><p>The following figure will help in understanding the relationship between various ATT&amp;CK components.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n6wA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n6wA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 424w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 848w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1272w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png" width="1024" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;MITRE ATT&amp;CK Object Model&quot;,&quot;title&quot;:&quot;MITRE ATT&amp;CK Object Model&quot;,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="MITRE ATT&amp;CK Object Model" title="MITRE ATT&amp;CK Object Model" srcset="https://substackcdn.com/image/fetch/$s_!n6wA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 424w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 848w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1272w, https://substackcdn.com/image/fetch/$s_!n6wA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69f4ac36-add7-411b-b3c1-db0568c63eac_1024x790.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Source: ATT&amp;CK Design and Philosophy Paper (page 27)</figcaption></figure></div><h2>Why was ATT&amp;CK created?</h2><p>MITRE's goal behind creating this framework was to improve post-compromise detection of threats by tracing out the steps that could have been taken by an adversary. It was born out of the need to categorize adversary behavior as part of conducting adversary emulation exercises within MITRE&#8217;s Fort Meade Experiment (FMX) research environment.</p><h2>What does it contain?</h2><p>There are three variants of ATT&amp;CK framework:</p><ul><li><p><a href="https://attack.mitre.org/matrices/enterprise/">Enterprise</a></p></li><li><p><a href="https://attack.mitre.org/matrices/mobile/">Mobile</a></p></li><li><p><a href="https://collaborate.mitre.org/attackics">ICS (Industrial Control Systems)</a></p></li></ul><p>Originally, the Enterprise variant focused only on Microsoft Windows. However, later it was expanded to include macOS, Linux, PRE, AWS, GCP, Azure, Azure AD, Office 365, SaaS, Network platforms as well.</p><p>Each variant contains various tactics, techniques, sub-techniques and procedures that could be used by an adversary. The best way to visualize the framework is <a href="https://mitre-attack.github.io/attack-navigator/">ATT&amp;CK Navigator</a>. It is an interactive web application, through which you can create layered views of the framework, as per your requirement.</p><h2>Use cases</h2><p>ATT&amp;CK can be used for various purposes, such as:</p><ul><li><p><a href="https://yaksas.in/ycscblog/what-is-adversary-emulation/">Adversary emulation</a></p></li><li><p>Red teaming</p></li><li><p>SOC assessments</p></li><li><p>Defensive gap assessments</p></li><li><p>Behavioral analytics development</p></li><li><p>Cyber threat intelligence enrichment</p></li></ul><p>MITRE provides an excellent <a href="https://www.mitre.org/sites/default/files/publications/mitre-getting-started-with-attack-october-2019.pdf">getting started guide</a> that shows how to utilize ATT&amp;CK framework for these use cases.</p>]]></content:encoded></item><item><title><![CDATA[What is Adversary Emulation?]]></title><description><![CDATA[Learn about adversary emulation. This post is part of our course Red Team Adversary Emulation: Mimicking a real-world cyber attack]]></description><link>https://www.yaksas.com/p/what-is-adversary-emulation</link><guid isPermaLink="false">https://www.yaksas.com/p/what-is-adversary-emulation</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:51:15 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/fc18c476-18db-4ec3-9b29-96126f0d72ec_768x414.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Red Team Adversary Emulation: Mimicking a real-world cyber attack</a>.</p><p>Adversary Emulation is a form of cybersecurity assessment. During this assessment assessors replicate a specific threat scenario. For example, assessors may assume the role of cyber criminals who want to exfiltrate customer data out of the organization. Another scenario could be assessors trying to infect the organization's software product(s) and mimic a supply chain attack.</p><h2>How to perform Adversary Emulation?</h2><p>These exercises are performed by red teams. The responsibility of defending lies with blue teams. Usually an attack methodology is created or followed to conduct these exercise. This can be in form of a process, such <a href="https://yaksas.in/ycscblog/red-team-operations-attack-lifecycle">Red Team Operations Attack Lifecycle</a>. Or well defined attack plans such as <a href="https://attack.mitre.org/resources/adversary-emulation-plans/">MITRE Adversary Emulation Plans</a>. Cyber threat intelligence sources also play a key role during this exercise. They often serve as a starting point for most exercises.</p><h2>Benefits</h2><p>The aim of this exercise is to see how the organization's defenses will fare in the event of a real cyber attack. Such exercises are helpful in identifying vulnerabilities missed during other assessments (such as penetration testing) as such assessments are usually limited in scope and attack surface. For example, <a href="https://www.zdnet.com/article/cybersecurity-how-facebooks-red-team-is-pushing-boundaries-to-keep-your-data-safe/">Facebook is leveraging adversary emulation</a> to protect their infrastructure from sophisticated attacks.</p><p>Featured Image Source: <a href="https://www.freepik.com/vectors/technology">Freepik</a></p>]]></content:encoded></item><item><title><![CDATA[Red Team Operations Attack Lifecycle]]></title><description><![CDATA[The nine-step process of conducting red team and adversary emulation exercises.]]></description><link>https://www.yaksas.com/p/red-team-operations-attack-lifecycle</link><guid isPermaLink="false">https://www.yaksas.com/p/red-team-operations-attack-lifecycle</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 29 Sep 2024 10:44:32 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/603e557e-bb04-4190-9fc6-06735d31f27c_2560x2560.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!P2qt!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!P2qt!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg" width="1024" height="407" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:407,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!P2qt!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 424w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 848w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!P2qt!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3c3f5a28-3c5a-47d7-8510-94cb04aa07f3_1024x407.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This post is part of our course <a href="https://courses.yaksas.in/p/adversary-emulation-101-mimicking-a-real-world-cyber-attack/?product_id=2250813&amp;coupon_code=YCSCAELAUNCHSALE">Adversary Emulation 101: Mimicking a real-world cyber attack</a>.</p><p>The lifecycle consisted of following phases, with phases 3-6 being cyclic in nature:</p><ol><li><p><strong>Recon (Information Gathering) </strong>&#8211; In this phase, publicly available information (website, company profile, social media pages, employee profiles etc.) is gathered about the target organization.</p></li><li><p><strong>Initial Compromise (Foothold) </strong>&#8211; In this phase, information from Recon phase is analysed to identify and exploit a vulnerability or launch a phishing attack that helps in establishing a foothold within the target network.</p></li><li><p><strong>Privilege Escalation </strong>- In this phase, the attacker attempts to escalate privileges to an administrator (Windows) or root (Linux) account on the compromised host. Usually, this is done each time a new host is compromised.</p></li><li><p><strong>Establishing Persistence </strong>&#8211; In this phase, the attacker installs a persistence mechanism (usually a Command and Control (C2) agent) to maintain presence in the target network. This enables the attacker to communicate with compromised hosts without having to exploit it again in case the original connection dies out. Usually, this is done each time a new host is compromised.</p></li><li><p><strong>Internal Recon </strong>&#8211; In this phase, the attacker leverages the compromised host to gather information about the internal network. Usually, this is done each time a new host is compromised and is thought to have access to more resources. For example, if an attacker compromises an Active Directory domain joined machine, they can use that machine to enumerate the Active Directory network.</p></li><li><p><strong>Lateral Movement </strong>&#8211; In this phase, the attacker tries to expand their access by compromising new hosts within the target network. The information collected during Internal Recon phase is leveraged here.</p></li><li><p><strong>Data Analysis </strong>&#8211; As new hosts are compromised, the attacker scans each of them for interesting information (employee records, financial statements, PII, credit card information, customer databases etc.).</p></li><li><p><strong>Exfiltration </strong>&#8211; Anything that the attacker deems useful is pulled out and downloaded onto the attacker machine (or their chosen location).</p></li><li><p><strong>Deleting footprints </strong>&#8211; Once the attacker has achieved their objective, they delete all files, logs, emails etc. created by them during the exercise to hide their presence.</p></li></ol>]]></content:encoded></item><item><title><![CDATA[Goodbye Passwords: Hello Passkeys]]></title><description><![CDATA[Discover why passkeys are revolutionizing security, offering a safer and easier alternative to passwords, backed by major organizations and industry standards.]]></description><link>https://www.yaksas.com/p/goodbye-passwords-hello-passkeys</link><guid isPermaLink="false">https://www.yaksas.com/p/goodbye-passwords-hello-passkeys</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sat, 28 Sep 2024 16:30:46 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/39b9e4a9-7823-4d0f-ad65-95273562b39b_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Passkeys are a new authentication method designed to eliminate the weaknesses of passwords. As <a href="https://developers.google.com/identity/passkeys">major companies adopt this technology</a>, it's being seen as a replacement to passwords, reshaping the way we think about authentication. But what exactly are passkeys, how do they work, and why are they considered the future of authentication?</p><h4>What Are Passkeys?</h4><p><a href="https://fidoalliance.org/passkeys/">Passkeys are a form of passwordless authentication</a> that use a combination of cryptographic keys for secure logins. Instead of relying on a password (something you know), passkeys leverage the security of biometrics (or patterns or PIN) and public-private key pairs. The private key is stored securely on your device, while the public key is shared with the server you&#8217;re trying to log in to. Since the private key never leaves your device and cannot be easily compromised, passkeys offer a much higher level of security than traditional passwords.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>How Do Passkeys Work?</h4><p>The magic behind passkeys lies in asymmetric cryptography. When a user wants to sign into a service, they use their device (e.g., smartphone, laptop) <a href="https://www.passkeys.com/what-is-passwordless-authentication">to confirm their identity through biometric recognition</a> such as Face ID, fingerprint scanning, or a device PIN. The device then generates a cryptographic signature using the private key, which is verified against the public key on the service&#8217;s server. This process eliminates the need for typing or remembering a password, making login faster and more secure.</p><p>Passkeys are stored on a user&#8217;s device and can sync across multiple devices via secure mechanisms such as cloud-based storage, adding an extra layer of convenience for users switching between devices. This synchronization ensures you can log in seamlessly across your devices.</p><h4>Why Are Passkeys Replacing Passwords?</h4><p>Passwords have been a fundamental part of authenticating users for decades, but they come with numerous challenges. Users often create weak passwords, reuse them across different platforms, or fall victim to phishing attacks and data breaches, putting their personal and financial data at risk. Passkeys address many of these shortcomings.</p><p>For one, passkeys are <a href="https://developer.apple.com/passkeys/">inherently phishing-resistant</a>. Unlike passwords, which can be intercepted through social engineering or malicious websites, passkeys never leave the user&#8217;s device, meaning there is nothing for a hacker to steal during the authentication process. They also eliminate the risk of credential stuffing&#8212;where attackers use previously compromised usernames and passwords across multiple accounts. Passkeys ensure that login credentials are unique to each user and service, reducing attack surfaces significantly.</p><h4>Benefits of Using Passkeys</h4><p>The benefits of passkeys extend beyond security. First and foremost, they simplify the user experience. People no longer need to memorize complex passwords or rely on password managers, which can also have vulnerabilities. Biometric-based passkey systems streamline login processes, making authentication fast and frictionless.</p><p>From a security standpoint, passkeys drastically reduce the risk of account compromise. Even if a service provider is hacked, there is no password for an attacker to steal and reuse. Passkeys are also highly resilient against man-in-the-middle attacks, ensuring that only the legitimate user can authenticate with their private key.</p><p>Another significant advantage is scalability. Organizations can deploy passkeys across large user bases without needing to train users on proper password hygiene, significantly reducing support costs and improving security posture.</p><h4>Major Organizations Encouraging the Use of Passkeys</h4><p>Several industry giants have already begun integrating passkey technology into their systems. Apple, Google, and Microsoft are leading the charge, all <a href="https://fidoalliance.org/members/">part of the FIDO Alliance</a>, a consortium working to improve online authentication standards. These companies have implemented passkeys into their ecosystems. By adopting passkeys, these organizations are signaling a shift away from the password-dependent era.</p><p>The <a href="https://www.w3.org/groups/wg/webauthn/">World Wide Web Consortium (W3C)</a> and the FIDO Alliance have also published the <em><a href="https://webauthn.me/passkeys">WebAuthn standard</a></em>, which supports passkey-based authentication, providing a roadmap for developers and businesses to transition away from passwords. WebAuthn, part of the broader FIDO2 framework, is a critical industry standard encouraging the adoption of passkeys. It not only provides security but also maintains a focus on user privacy, ensuring that no Personally Identifiable Information (PII) is shared during authentication.</p><h4>Conclusion</h4><p>Passkeys offer a much-needed solution to the problems that passwords present. By relying on cryptography and biometrics, they provide a higher level of security and an easier user experience. As passkeys gain traction across major platforms and industry standards like FIDO2 and WebAuthn promote their adoption, it&#8217;s becoming clear that the days of passwords may be numbered.</p><p>Do you think passkeys will completely replace passwords in the near future, or will we still rely on passwords? Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[BlueBorne: Turn that Bluetooth off]]></title><description><![CDATA[Information on BlueBorne flaws in Bluetooth capability of mobile devices. They make it easy for attackers to break into any mobile device.]]></description><link>https://www.yaksas.com/p/blueborne-turn-that-bluetooth-off</link><guid isPermaLink="false">https://www.yaksas.com/p/blueborne-turn-that-bluetooth-off</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 27 Sep 2024 17:53:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/4c62771a-7aca-47f5-b2df-72ede37660b1_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A cool thing about Person of Interest, a popular television show, is it's depiction of how easily mobile devices can be broken into. On a typical day, <a href="http://personofinterest.wikia.com/wiki/John_Reese">John Reese</a>&nbsp;(played by <a href="http://personofinterest.wikia.com/wiki/Jim_Caviezel">Jim Cviezel</a>) would walk by the person of interest, tap a few times on his phone and gets full access to the target's mobile device. Until three days back this was fiction. Today it's not. Thanks to BlueBorne. Watch the following video if you don't believe me.</p><div id="youtube2-Az-l90RCns8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Az-l90RCns8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Az-l90RCns8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>On 13th September, 2017, Armis, a US-based security lab, published a research article titled, BlueBorne. In this article they have explained eight flaws through which a mobile device can be compromised. They have termed these flaws as BlueBorne. These flaws exist in the way Bluetooth functionality is applied in mobile devices. As a result, an ill willed hacker can take full control of the device without any action on the part of the user. When using these flaws the hacker doesn't even need to pair their device with the target mobile device. This makes BlueBorne a dangerous attacking technique. Imagine, you're walking in a local market with your mobile device in pocket.<strong> If your device's Bluetooth is enabled, then anyone who can detect your device can, potentially, take control of your device.</strong> Of course, they would need the knowledge and skills to take advantage of these flaws.</p><p>BlueBorne flaws exist in all devices that are equipped with Bluetooth and running Android, iOS (9.3.3 and below), Windows (Vista and above) and Linux operating systems. At the time of writing there are approximately <a href="https://www.bluetooth.com/what-is-bluetooth-technology/where-to-find-it">8.2 billion</a> such devices across the world.</p><h2>How to protect your device?</h2><p>Here are few steps you can take to protect your device from these flaws:</p><ul><li><p>Keep your mobile device's Bluetooth disabled if not required.</p></li><li><p>If you have an Android device, you can check if it's vulnerable using <a href="https://play.google.com/store/apps/details?id=com.armis.blueborne_detector">this app</a> released by ArmisLabs.</p></li><li><p>Update your mobile device to the latest version of the operating system released by the device manufacturer.</p></li><li><p>If an update is not available for your mobile device:</p><ul><li><p>Avoid using device's Bluetooth capability in public places</p></li></ul></li></ul><p>Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[The Power of Security Champions]]></title><description><![CDATA[A Security Champions program empowers teams to integrate security from the start, promoting best practices and fostering a security-first culture across an organization.]]></description><link>https://www.yaksas.com/p/the-power-of-security-champions</link><guid isPermaLink="false">https://www.yaksas.com/p/the-power-of-security-champions</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Thu, 26 Sep 2024 15:34:49 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e1216030-0b0e-4fb3-8bfb-452b19961c1b_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A Security Champions program is a strategic initiative that empowers employees, particularly developers, to become advocates for security within their teams. It leverages individuals passionate about cybersecurity to bridge the gap between security teams and other departments. Implementing a Security Champions program not only strengthens an organization's defences but also creates a culture of shared responsibility. As companies become more reliant on technology, integrating security at every step of development has become essential, and this program is key to making it happen.</p><h4>What is a Security Champions Program?</h4><p>A Security Champions program appoints select employees, often from development teams, to act as liaisons between their team and the security department. These champions receive specialized training on security best practices, which they then relay to their peers. The idea is to make security a shared responsibility rather than the sole domain of the IT or security department. This creates an organizational mindset where security is considered at every stage of a project&#8212;from initial planning through deployment&#8212;ensuring that security is "baked in" rather than "bolted on" at the end.</p><h4>Benefits of Implementing a Security Champions Program</h4><ol><li><p><strong>Evangelizing Security Standards</strong>: One of the key benefits of a Security Champions program is that it helps promote security standards across the organization. Security Champions are responsible for educating their colleagues about best practices, ensuring that security becomes a part of the daily routine for everyone involved in software development. By embedding security knowledge within the teams, the program helps create awareness and accountability, making it easier to follow policies and adhere to security guidelines.</p></li><li><p><strong>Making Security Approachable</strong>: Traditionally, security teams can seem distant and overly technical, which can lead to miscommunication or a lack of understanding between them and other departments. Security Champions act as translators, making security concepts more approachable for their peers. This fosters a collaborative environment where questions can be asked freely, and concerns are addressed without the stigma that security is a specialized domain meant for experts only. This ultimately leads to fewer misunderstandings and robust security practices.</p></li><li><p><strong>Providing Security Training</strong>: One of the pillars of a successful Security Champions program is continuous training. Champions receive ongoing security education, which they then disseminate to their teams. This proactive approach also allows employees to develop a deeper understanding of how security affects their day-to-day work, rather than treating it as a last-minute checklist item.</p></li><li><p><strong>Integrating Security Early in the Process</strong>: A critical advantage of this program is that it encourages developers to think about security from the outset of the development process. Security Champions are embedded in development teams, meaning that security concerns are raised early in the software lifecycle, reducing the risk of vulnerabilities being introduced later. This "shift-left" approach to security is vital in reducing the time and cost associated with fixing security issues after a product has already been built.</p></li><li><p><strong>Helping Developers</strong>: For developers, a Security Champions program is a game changer. It provides them with the tools, knowledge, and support they need to integrate security best practices into their work without sacrificing speed or creativity. Developers often feel the pressure to meet deadlines, and security can be seen as an obstacle to fast delivery. However, by having a security expert within their ranks, developers can address potential vulnerabilities as they code, ensuring they can meet security requirements without adding extra time at the end of a project.</p></li></ol><h4>Conclusion</h4><p>A Security Champions program is an effective strategy to embed security into the DNA of a company, promoting security-conscious behaviour, building awareness, and preventing vulnerabilities from slipping through the cracks. By encouraging collaboration and empowering developers with the right skills and mindset, companies can ensure that security is part of the process from the very beginning, ultimately resulting in a more secure and resilient organization.</p><p>In your opinion, what qualities should a Security Champion possess to be most effective? Join the discussion on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersec-infoshare-whatsapp">WhatsApp (Yaksas Cybersecurity Infoshare)</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Risk Owners to Risk Advisors]]></title><description><![CDATA[CISOs should guide cybersecurity risk management, not own risks. Learn why the CISO's advisory role is crucial for business security and executive leadership engagement.]]></description><link>https://www.yaksas.com/p/from-risk-owners-to-risk-advisors</link><guid isPermaLink="false">https://www.yaksas.com/p/from-risk-owners-to-risk-advisors</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Wed, 25 Sep 2024 10:37:39 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9cf3f1e7-28ce-4ce5-9288-f5969032837a_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The Chief Information Security Officer (CISO) plays a critical role in addressing an organisation&#8217;s cybersecurity risks. A growing consensus <a href="https://www.forbes.com/sites/danwoods/2018/11/30/why-cisos-need-to-teach-everyone-to-own-risk/">asserts</a> that the CISO should act as a risk advisor, not a risk owner. This distinction is critical in fostering an <a href="https://yaksas.com/p/foundations-of-a-strong-cybersecurity">effective cybersecurity program</a> and ensuring that risks are managed by the right people.</p><h4>The CISO&#8217;s Role as a Risk Advisor</h4><p>The core responsibility of a CISO is to advise on cybersecurity risks that threaten the organization. They identify, assess, and communicate these risks to business leaders, ensuring that each risk is understood in the context of the organization&#8217;s strategic objectives. However, risk management often spans multiple areas of the business. The CISO oversees these areas from a security perspective but does not control these areas operationally. Consequently, the CISO should be considered as a guide to business units without bearing the ultimate responsibility for owning the risk itself.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Why CISOs Should Not Be Risk Owners</h4><p>The reasoning behind separating the roles of advisor and owner is simple: ownership of risk typically rests with the people who can take action to mitigate or transfer it. Business units and CXOs have the ability to make decisions that directly impact their areas of operation. On the other hand, a CISO&#8217;s expertise is in assessing and advising on risks, not in controlling business processes outside the security domain. This creates a conflict when the CISO is expected to own risks that they do not have the authority to mitigate or influence fully.</p><p>Treating a CISO as a risk owner misaligns responsibilities. It shifts focus away from their role as an impartial assessor of risk and forces them to make decisions that could be better handled by business leaders.</p><h4><strong>Convincing the Executive Leadership: CISO as Advisor</strong></h4><p>One of the most important tasks for a CISO is to convince the executive leadership, including the CEO, that they should function as a risk advisor. This begins with clear communication about the limitations of the CISO&#8217;s authority. For instance, while the CISO can advise on the potential consequences of a cyberattack or a data breach, they may not be able to dictate operational changes in areas like supply chain management or customer service that fall under other business units (in some cases they can, provided they can back it up with solid data).</p><p>The CISO must work closely with executives to define their role in the risk management framework. This includes explaining that cybersecurity risks intersect with broader business risks, such as financial and operational risks, which need to be managed by respective departments.</p><h4>Establishing a Risk Ownership Charter</h4><p>The CISO can advocate for the establishment of a clear charter where risk ownership is formally assigned to business unit heads or other CXOs who are equipped to handle specific types of risks. Such a charter would detail the distribution of responsibilities across the organization, specifying that business unit leaders are responsible for risks tied to their functions. The CISO, in turn, serves as a consultant, providing insights and guidance on cybersecurity risks but leaving the decision-making to the respective risk owners.</p><p>This charter also helps build a culture of shared responsibility. By establishing risk ownership across different units, organizations can avoid the common pitfall of overloading the CISO with expectations they cannot fulfill. The CISO&#8217;s advisory role remains focused on assessing risks, aligning security measures with business goals, and ensuring that risk owners take action based on informed guidance.</p><h4>Building Trust with the Board and CXOs</h4><p>For a CISO to successfully operate as an advisor, they must <a href="https://yaksas.com/p/cisos-path-to-building-trust">build trust with the board, CXOs, and business unit leaders</a>. This can be achieved through transparent communication, frequent updates on emerging threats, and ensuring that cybersecurity strategies are aligned with business priorities. When the leadership recognizes the value the CISO brings in guiding risk decisions, they are more likely to embrace the advisor model and promote risk ownership across the organization.</p><p>As the advisor, the CISO can foster informed decision-making by offering a strategic view of cybersecurity risks. This ensures that the organization is prepared to respond to threats while each business unit retains ownership of risks specific to their domain.</p><p>As a CISO, how do you ensure that your advisory role is respected and that business units are fully engaged in managing their own risks?</p><p>Join us on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersafety">WhatsApp</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[India’s Move to Safeguard Data Privacy of Citizens]]></title><description><![CDATA[India's DPDP Act 2023 enforces data privacy with strict consent, cross-border data rules, data principal rights, and heavy penalties for non-compliance.]]></description><link>https://www.yaksas.com/p/indias-move-to-safeguard-data-privacy</link><guid isPermaLink="false">https://www.yaksas.com/p/indias-move-to-safeguard-data-privacy</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Tue, 24 Sep 2024 10:03:21 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/9ede5c15-9819-472a-a011-76f72212f038_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In August 2023, India made a significant move forward to uplift the country&#8217;s cyber laws by passing the <a href="https://www.meity.gov.in/writereaddata/files/Digital%20Personal%20Data%20Protection%20Act%202023.pdf">Digital Personal Data Protection Act, 2023</a>. While the Act is <a href="https://www.india-briefing.com/news/india-dpdp-act-to-be-enacted-after-2024-general-elections-32269.html/">yet to be enforced</a> but it puts India&#8217; data privacy rules on par with international laws. </p><p>The DPDP Act addresses the growing concerns over data misuse and breaches. The Act's emphasis on consent, data fiduciaries, localization, and stringent penalties positions it as a robust framework for data protection. Although it shares similarities with the GDPR, particularly in safeguarding privacy and regulating data handling, key differences in scope, consent management, and cross-border data flow highlight the distinct approach India has taken in ensuring digital privacy for its citizens.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Here&#8217;s a bullet-point summary of the key points of this Act:</p><ul><li><p><strong>Data Fiduciaries</strong>:</p><ul><li><p>Entities that determine the purpose and means of processing personal data.</p></li><li><p>Must obtain explicit consent, ensure transparency, and protect personal data.</p></li></ul></li><li><p><strong>Significant Data Fiduciaries (SDFs)</strong>:</p><ul><li><p>Designated based on factors like the volume of data processed and potential risk to privacy.</p></li><li><p>Must appoint a <strong>Data Protection Officer (DPO)</strong>, conduct <strong>Data Protection Impact Assessments (DPIAs)</strong>, and undergo regular audits.</p></li></ul></li><li><p><strong>Data Protection Board of India</strong>:</p><ul><li><p>Established to oversee compliance, adjudicate complaints, and enforce the DPDP Act.</p></li></ul></li><li><p><strong>Appointment of Data Protection Officer (DPO)</strong>:</p><ul><li><p>Mandatory for Significant Data Fiduciaries.</p></li><li><p>Ensures compliance and serves as a contact point for the Data Protection Board.</p></li></ul></li><li><p><strong>Privacy Rights of Individuals (Data Principals)</strong>:</p><ul><li><p><strong>Consent</strong>: Personal data can only be processed with explicit, informed consent.</p></li><li><p><strong>Right to Notice</strong>: Individuals must be informed about the purpose, duration, and type of data being collected.</p></li><li><p><strong>Right to Access</strong>: Data principals can request access to their data and know how it&#8217;s being processed.</p></li><li><p><strong>Right to Correction</strong>: Individuals can request corrections if their data is inaccurate.</p></li><li><p><strong>Right to Deletion</strong>: Data principals can request deletion of personal data if no longer necessary.</p></li><li><p><strong>Right to Grievance Redressal</strong>: Individuals can file complaints if their data rights are violated.</p></li></ul></li><li><p><strong>Explicit Consent vs. Deemed Consent</strong>:</p><ul><li><p><strong>Explicit Consent</strong>: Data processing requires clear, informed permission.</p></li><li><p><strong>Deemed Consent</strong>: Allows data processing in specific situations like legal obligations or emergencies without explicit consent.</p></li></ul></li><li><p><strong>Cross-Border Flow of Data</strong>:</p><ul><li><p>Sensitive personal data can be transferred outside India only with government approval.</p></li><li><p>Emphasizes <strong>data localization</strong>, requiring certain data to be stored in India.</p></li></ul></li><li><p><strong>Penalties</strong>:</p><ul><li><p>Violations can result in fines between &#8377;50 crore and &#8377;250 crore, depending on severity.</p></li></ul></li><li><p><strong>Data Minimization</strong>:</p><ul><li><p>Organizations must only collect the minimum amount of data necessary for the specified purpose.</p></li></ul></li></ul><p>As the use of digital platforms and services expands, this legislation seeks to create a structured framework to regulate how organizations handle personal data. The DPDP Act aims to provide clarity on data processing practices while balancing innovation and user privacy.</p><p>Did you find this article useful? Share your thoughts on DPDP Act, 2023 with us. Join us on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersafety">WhatsApp</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[10 Tips for Safe Digital Payments]]></title><description><![CDATA[Simple tips to ensure a safe digital payment experience.]]></description><link>https://www.yaksas.com/p/10-tips-for-safe-digital-payments</link><guid isPermaLink="false">https://www.yaksas.com/p/10-tips-for-safe-digital-payments</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Mon, 23 Sep 2024 06:22:50 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/f62bda18-3574-4ab9-9eea-894403925a62_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Today, there are at least six methods through which goods and services can be paid for. These are net banking, mobile wallets, Unified Payments Interface (UPI) based apps, Aadhaar Enabled Payments System (AEPS), cards, USSD banking, Point of Sale (PoS), mobile banking, micro ATMs etc. All of these payment methods are geared towards promoting cashless means of making and accepting payments. They have also simplified the entire process. For example, using a UPI based app, one can pay at a local kirana store in max. two taps on the phone screen.</p><p>In India, digital payment methods saw rapid adoption during the <a href="http://yaksas.in/ycscblog/currency-ban-cyber-security/">demonetization process</a>. Ever since, the awareness about them has grown and more people are using them as their preferred means of payment. Even vendors are rapidly adopting them as a means of accepting payments. Do a quick survey of your local market and you'd notice that most shops are now accepting payments through one or more mobile wallet providers.</p><p>Digital payment methods are also a good way to get rid of that extra cash in your physical wallet. Below are few safety tips that would enable you to adopt them with ease:</p><ol><li><p><strong>Protect your phone with a device-lock mechanism:</strong> Payment modes like mobile wallets, UPI based apps, mobile banking etc. are primarily driven through apps on mobile devices. Without a device-lock, anybody who has access to your phone, can access these apps easily. A device-lock also protects your information from misuse in case the mobile device is lost or stolen.</p></li><li><p><strong>Protect your payment apps with an app-lock mechanism:</strong> Most payment apps support an additional layer of security by allowing the user to lock the app. They often also provide an option to set a custom pass-code or use the device-locking mechanism to lock / unlock the app. This ensures that even if your mobile device is in other hands, your financial information stays protected.</p></li><li><p><strong>Add only the required amount of currency in mobile wallets:</strong> Loading mobile wallets with more currency is not advisable. It increases your exposure to loss in case your mobile wallet gets compromised. Most mobile wallet service providers also restrict the amount users can add in a month.</p></li><li><p><strong>Ensure that your card details are protected:</strong> Do not share information such as CVV number, PIN, Card number etc. with anyone. Remember, banks will never ask you for these details on call. Ensure that the merchant is well-reputed and trusted before storing card details with them. As an additional safety measure, you can scratch the CVV number off your card after memorizing it.</p></li><li><p><strong>Check for HTTPS before performing an online payments</strong>: Most service providers and banks use a secure (encrypted) communication channel for online payments. This channel is known as Hyper-Text Transfer Protocol over Transport Layer Security or HTTPS. The most common way to identify this is a green pad-lock icon in the left corner of the address bar. </p></li><li><p><strong>Keep an eye on payment transaction alert messages</strong>: Anytime you perform a payment transaction, the concerned bank sends a SMS alert regarding the same. If you haven't opted for this service, do so today. Alert SMS helps you in keeping track of activity on your bank account. If you come across any suspicious alert, report the same to the concerned bank immediately. </p></li><li><p><strong>Enable Two-Factor Authentication (2FA): </strong>Wherever possible, enable 2FA on your payment apps and accounts to add an extra layer of security.</p></li><li><p><strong>Avoid Public Wi-Fi for Transactions: </strong>Public Wi-Fi networks are often unsecured and can expose your payment data to hackers. Use a secure, private connection when making payments.</p></li><li><p><strong>Update Software Regularly: </strong>Ensure that your phone&#8217;s operating system, apps, and security software are updated to the latest versions to protect against vulnerabilities.</p></li><li><p><strong>Report Lost/Stolen Devices Immediately</strong>: In case your device is lost or stolen, report it to your bank or payment service provider immediately to block access to your accounts.</p></li></ol><p>Did you find these tips useful? Do you have any tips of your own? Share them with us. Join us on <a href="https://yks.red/discord">Discord</a> or <a href="https://yks.red/cybersafety">WhatsApp</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Safeguarding Mergers: A CISO's Role]]></title><description><![CDATA[Mergers and acquisitions (M&A) are high-stakes ventures, often accompanied with complex infrastructure integration scenarios. A trusted CISO plays a pivotal role during this time.]]></description><link>https://www.yaksas.com/p/safeguarding-mergers-a-cisos-role</link><guid isPermaLink="false">https://www.yaksas.com/p/safeguarding-mergers-a-cisos-role</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sun, 22 Sep 2024 13:56:30 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/55ffe465-38d2-47a1-84a8-ae163230981d_1456x1048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The role of a Chief Information Security Officer (CISO) in mergers and acquisitions (M&amp;A) is a crucial one. The integration of two companies brings not only financial and operational challenges but also significant cybersecurity risks. From the perspective of executive leadership, the CISO is a gatekeeper of trust, tasked with managing risk, and ensuring a seamless transition.</p><h4>Building Trust at the Executive Level</h4><p>M&amp;As are sensitive transactions, where a security breach or misstep could significantly impact the deal. This makes the CISO&#8217;s ability to gain and maintain trust with the board and executive leadership critical. The CISO is expected to provide a comprehensive view of the cybersecurity risks that could affect both entities. In many cases, the CISO will need to perform due diligence and assess hidden threats, such as undiscovered vulnerabilities, regulatory violations, if any, within the acquired company. By doing so, they help mitigate potential financial, operational, and reputational damage, which is why the CISO needs to be proactive and transparent with the board and the executive team.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Moreover, the CISO should act as a bridge between various departments. Engaging with these stakeholders early on can demonstrate the CISO's understanding of both technical and business challenges, thus building credibility and trust during these negotiations.</p><h4>Infrastructure Integration</h4><p>A significant part of the CISO&#8217;s role during M&amp;A is the complex task of integrating two organisations' IT and cybersecurity infrastructures. This involves aligning disparate technologies, systems, and protocols while maintaining business continuity. One of the key challenges is merging different security cultures&#8212;every organisation has its unique approach to cybersecurity. Harmonizing these can be a daunting task, requiring the CISO to identify strengths and weaknesses within both entities and craft a unified security strategy that leverages the best practices from each side&#8203;.</p><p>Technological compatibility is another issue the CISO must address. The acquired company may use different security platforms or tools, making integration tricky. Whether adopting a hybrid model or transitioning to a unified platform, the CISO must ensure that the merger does not disrupt day-to-day operations while keeping systems secure&#8203;.</p><h4>Skills and Experience Needed</h4><p>To navigate such high-stakes projects successfully, a CISO needs a blend of strategic foresight, technical expertise, and leadership acumen. Experience in managing large-scale integrations, particularly those involving different security systems, is essential. CISOs must also possess strong risk management skills, as they are responsible for identifying potential threats not just within IT systems but also in operational processes and business functions.</p><p>Another vital skill is communication. CISOs must articulate technical issues in a way that board members and executives can understand, ensuring that cybersecurity is seen as a critical element of the business deal rather than an afterthought. Furthermore, their ability to collaborate with various departments&#8212;from legal to finance to HR&#8212;helps in creating a holistic security strategy that addresses both technological and organisational vulnerabilities.</p><h4>Ensuring a Smooth Transition</h4><p>The final aspect of the CISO&#8217;s role involves developing a clear plan for risk mitigation during and after the merger. This may include conducting thorough due diligence on the acquired company&#8217;s cybersecurity posture, identifying the top risks, and establishing a timeline for addressing these issues. By doing so, the CISO can help ensure that both companies maintain a secure operational environment as they transition into a single entity&#8203;.</p><p>Additionally, the CISO must be vigilant for external threats during the merger process, as cybercriminals often exploit the chaotic period to launch attacks. This calls for a well-coordinated effort between both companies' security teams, ensuring that no gaps are left unmonitored&#8203;.</p><h4>Conclusion</h4><p>In conclusion, the role of a CISO in M&amp;A is varied, requiring technical know-how, strategic thinking, and effective communication. By establishing trust with leadership and carefully navigating the integration of two entities, the CISO plays a critical part in the success of mergers and acquisitions, protecting the deal&#8217;s value and ensuring a secure future for the combined organisation.</p><p>What challenges have you faced while navigating M&amp;As, and how did you address them? We'd love to hear your insights.  </p><p><a href="https://yks.red/discord">Join us on Discord</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.yaksas.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Yaksas Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>