January 1, 2023

TSD #022: LastPass vs The Internet.

Hello friend 👋

Welcome to 2023! I wonder what the year will bring to the cybersecurity industry. More breaches? More critical vulnerabilities? More ransomware? I'm betting on all three.

Last week I reported a significant update to the LastPass incident after they reported that customer password vaults were stolen. This week we've had some interesting updates.

Jeffrey Goldberg, Principal Security Architect @ 1Password, published a blog and tweet that calls some of LastPass' claims into question. Jeffrey was very polite in doing so, and I've used 1Password before (and liked it), so I gave their blog a read.

We could say that 1Password is chasing customers, which will definitely be an element here, but Jeffrey's blog is definitely worth a read. It'll help you learn about how other companies claim to operate. Unless you dig deep, it's hard to learn about key differences between password management companies, this blog post does a good job of highlighting some key ones.

The world of cyber is usually quiet at this time of year and this year is no exception. I'll be taking a few days to figure out what habits I want to form in 2023, and then start my rocket boosters! What about you?

You can get in touch with me by simply hitting reply. I respond to every email that hits my inbox.

Until next week,

Gary ✌️

Fun Things This Week

🎙Latest Video

A friend of mine, Jason Rebholz (his LinkedIn) put out a video about the LastPass breach. He does a great job giving his CISO-level insight into cloud password managers. Check it out here:

💻 Products

Santa Claus was good to me this year and I now have a fully stocked sock drawer! My little girl isn't quite big enough for more complex games, but if you have someone to play with that's interested in cyber/hacking you might like to play this!

👾 Cool Tools

Autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. In the real world, automatic exploitation doesn't always work out the best, but in CTFs you might want to use something like this.

Aftermath is a Swift-based, open-source incident response framework. It can be used by defenders to to collect data from a compromised macOS host. It's written and maintained by Jamf - the Apple device management company.


If you've written a tool and you'd like me to see it, just drop me an email!

​​


Whenever you’re ready, there are a few ways I can help you:

1. If you'd like to learn how to create content to raise your online profile, I have a free email crash course and a whole series of video workshops.

2. If you want to land a career in cyber security but don't know where to start, your best bet is through my SWITCHFIRE guide.

3. If you'd like to promote yourself or your business and help keep this newsletter free to its readers, you can sponsor it by dropping me an email.

More Articles
Subscribe to The Sunday Download

Receive weekly news and insights in your inbox. Don't miss out!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.