Lori A W Imdad

21 Followers
62 Following
133 Posts
I'm a B2B content writer delivering cyber, infosec & tech content. I cover topics on cybersecurity products and services so every visitor understands the benefits and features clearly. 
I also share timely bits of security & writing tips as part of my biweekly newsletter, The SWC Beat. Sign up here https://swcbeat.substack.com
Get in touch. https://beacons.ai/sheknowscyber
BlueSky:https://bsky.app/profile/imdadcommunications.com
YouTube:https://youtube.com/@sheknowscyber
Instagram:https://instagram.com/mrsloriimdad
Website:https://www.laimdad.com
Disclaimers:https://www.shewritescyber.com/terms-conditions/
Pronouns:she/her/hers
On Monday, my last Blue Bird account goes down. I many ways it feels freeing. I have been slowly removing my accounts and now am down to one. Yay! #goodbyeX #goodbyeelonmusk

Since the LastPass breaches in 2022, the security community has walked on eggshells. While no password manager is foolproof, and it's always possible that one will be breached, LastPass did make a number of errors. There were many reports that detailed what went wrong that came out at the time of the breach.
 

@briankrebs of Krebs On Security has been researching more recent security incidents and how they may be connected. 

Read more about it, here: https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/

#cybersecurity #lastpass #krebsonsecurity

Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach – Krebs on Security

Happy to share a new update from Innovate Cybersecurity on Baselining Endpoint Risk, https://innovatecybersecurity.com/news/baselining-endpoint-risk/

#cybersecurity #securityrisk #improvingsecurity

Baselining Endpoint Risk

Baselining endpoints tells security professionals what risks exist and lets them develop a plan that improves and matures your security. Here we take a look at the common issues they find.

Innovate Cybersecurity | Threat Advisory, News, and Events

Hello, What's going on? I love hearing about new things that let people learn about risky things. This week I listened to Cyberwire’s podcast, #HackingHumans with @bittner

What is a scam? Can you tell the difference? If you think you’re smarter than the average scammer, here’s a pop quiz from the Washington Post. https://tinyurl.com/4nacj4sc

Let me know how you did and which question tripped you, if any. #cybersecurity #whatisascam #risksirl @thecyberwire

Can you identify the scammer? Test how good you are at avoiding scams.

Scams are everywhere, and scammers are relentless. Think you know how to best avoid falling for a scam? Take our quiz and find out.

The Washington Post
Detecting and mitigating a multi-stage AiTM phishing and BEC campaign | Microsoft Security Blog

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.

Microsoft Security Blog
What's in a newsletter? Join the SWC Beat to find out at https://swcbeat.substack.com
SWC Beat Newsletter | Lori Imdad | Substack

The SWC Beat is a biweekly newsletter from She Writes Cyber and by Lori Imdad. In it we share current cybersecurity news, advice for freelancers, and some fun anecdotes. Get to know She Writes Cyber and Lori by joining the community. Click to read SWC Beat Newsletter, by Lori Imdad, a Substack publication. Launched 3 days ago.

Detecting and mitigating a multi-stage AiTM phishing and BEC campaign | Microsoft Security Blog

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.

Microsoft Security Blog
Detecting and mitigating a multi-stage AiTM phishing and BEC campaign | Microsoft Security Blog

Microsoft Defender Experts observed a multi-stage adversary-in-the-middle (AiTM) and business email compromise (BEC) attack targeting banking and financial services organizations over two days. This attack originated from a compromised trusted vendor, involved AiTM and BEC attacks across multiple supplier/partner organizations for financial fraud, and did not use a reverse proxy like typical AiTM attacks.

Microsoft Security Blog
This made me smile today even though I also though he'd never end up in prison. Great write by @morninggloria. #TrumpIndictment
Trump’s Piggish Behavior Toward Women Is What Brought His Ass Down https://www.thedailybeast.com/trumps-piggish-behavior-toward-women-brought-his-ass-down?source=twitter&via=desktop via @thedailybeast
Trump’s Piggish Behavior Toward Women Brought His Ass Down

It is purely morally satisfying that the ex-president—a vile, lifelong misogynist—is facing criminal charges for essentially stepping on his own dick.

The Daily Beast
I agree 100%
0%
Nah, it's not that bad
0%
I'm staying on the fence 50/50
0%
Poll ended at .
Bitwarden flaw can let hackers steal passwords using iframes

Bitwarden's credentials autofill feature contains a risky behavior that could allow malicious iframes embedded in trusted websites to steal people's credentials and send them to an attacker.

BleepingComputer