Tag

Threat Detection

Stay current on methods and technologies used to identify cyber threats before they escalate. Topics include intrusion detection systems, anomaly monitoring, threat intelligence feeds, endpoint detection, and behavioral analysis techniques for proactive defense.

posts

Adware vs Spyware

Adware vs Spyware: What Security Pros Know You Don't

In March 2021, Avast researchers disclosed that at least 28 browser extensions — used by roughly three million people — were quietly harvesting browsing data and redirecting users to phishing and ad-laden sites. Some of those extensions looked like simple ad-blocking tools. Others posed as social media helpers. Under the hood, they

Carl B. Johnson Sep 16, 2021 7 min read
Cybersecurity Incident Response

Cybersecurity Incident Response: A Battle-Tested Guide

In July 2020, Twitter lost control of 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — in a social engineering attack that bypassed every technical control the company had. The attackers didn't use a zero-day exploit. They manipulated employees. And Twitter's cybersecurity incident

Carl B. Johnson Dec 20, 2020 7 min read
Incident Response Plan Template

Incident Response Plan Template: Build Yours Today

The SolarWinds breach discovered this month compromised at least 18,000 organizations — including multiple U.S. government agencies — and most of them had no actionable incident response plan template ready when the alerts started firing. I've watched organizations scramble through breaches with nothing but a stale PDF from

Carl B. Johnson Dec 20, 2020 7 min read
Cyber Incident Response Steps

Cyber Incident Response Steps That Actually Work

When SolarWinds disclosed in December 2020 that threat actors had compromised their Orion software update mechanism — affecting up to 18,000 organizations including multiple U.S. government agencies — it became the most significant supply chain attack in modern history. The organizations that responded effectively didn't improvise. They followed

Carl B. Johnson Dec 20, 2020 7 min read
Adware vs Spyware

Adware vs Spyware: What Security Teams Must Know

In 2023, a seemingly harmless browser extension called "PDF Toolbox" was downloaded over two million times from the Chrome Web Store before researchers at Palant discovered it was quietly injecting tracking code and redirecting ad revenue — a textbook adware operation that crossed hard into spyware territory. That single

Carl B. Johnson May 08, 2020 7 min read
Insider Threat Indicators

Insider Threat Indicators: 9 Red Flags You Can't Ignore

The Breach That Came From the Inside In 2022, a former Twitter employee was convicted of spying on behalf of Saudi Arabia, accessing the personal data of dissidents using nothing more than his legitimate credentials. No malware. No phishing email. Just an insider with access and motive. That case made

Carl B. Johnson Oct 01, 2019 7 min read
Adware vs Spyware

Adware vs Spyware: What Security Teams Must Know

In 2023, a barcode scanner app on the Google Play Store — used by over 10 million people — pushed a malicious update that turned a legitimate tool into an aggressive adware delivery mechanism overnight. Users were flooded with pop-ups and redirected to shady websites. Within weeks, researchers discovered the same app

Carl B. Johnson Jul 14, 2019 7 min read