<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyber Defence Analysis for Blue & Purple Teams]]></title><description><![CDATA[Summarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates.]]></description><link>https://bluepurple.binaryfirefly.com</link><image><url>https://substackcdn.com/image/fetch/$s_!cDGH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff99163ce-5bea-4b69-88df-e191823eba5d_1280x1280.png</url><title>Cyber Defence Analysis for Blue &amp; Purple Teams</title><link>https://bluepurple.binaryfirefly.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 13 Apr 2026 12:25:58 GMT</lastBuildDate><atom:link href="https://bluepurple.binaryfirefly.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Ollie Whitehouse from BinaryFirefly]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[bluepurple@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[bluepurple@substack.com]]></itunes:email><itunes:name><![CDATA[Ollie]]></itunes:name></itunes:owner><itunes:author><![CDATA[Ollie]]></itunes:author><googleplay:owner><![CDATA[bluepurple@substack.com]]></googleplay:owner><googleplay:email><![CDATA[bluepurple@substack.com]]></googleplay:email><googleplay:author><![CDATA[Ollie]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Bluepurple Pulse: week ending October 29th..]]></title><description><![CDATA[Has moved - this weeks new link within..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-d5b</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-d5b</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 26 Oct 2023 15:09:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cDGH!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff99163ce-5bea-4b69-88df-e191823eba5d_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>As mentioned yesterday, it has moved and this weeks publication can be found here.</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:138275110,&quot;url&quot;:&quot;https://ctoatncsc.substack.com/p/cto-at-ncsc-summary-week-ending-october&quot;,&quot;publication_id&quot;:2057566,&quot;publication_name&quot;:&quot;CTO at NCSC - Cyber Defence Analysis&quot;,&quot;publication_logo_url&quot;:null,&quot;title&quot;:&quot;CTO at NCSC Summary: week ending October 29th&quot;,&quot;truncated_body_text&quot;:&quot;Welcome to the weekly highlights and analysis of the blueteamsec subreddit (and my wider reading). Not everything makes it in, but the best bits do. Firstly, welcome to the new home but same format for those that have followed here from the old Substack.&quot;,&quot;date&quot;:&quot;2023-10-26T12:23:50.776Z&quot;,&quot;like_count&quot;:1,&quot;comment_count&quot;:1,&quot;bylines&quot;:[{&quot;id&quot;:177420441,&quot;name&quot;:&quot;Ollie Whitehouse&quot;,&quot;handle&quot;:&quot;ollieatncsc&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/01b621a7-4e49-4a9d-b1b6-ef3003f7841b_960x960.png&quot;,&quot;bio&quot;:&quot;CTO of the UK's National Cyber Security Centre \n\n&quot;,&quot;profile_set_up_at&quot;:&quot;2023-10-25T11:56:56.224Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:2059251,&quot;user_id&quot;:177420441,&quot;publication_id&quot;:2057566,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:2057566,&quot;name&quot;:&quot;CTO at NCSC - Cyber Defence Analysis&quot;,&quot;subdomain&quot;:&quot;ctoatncsc&quot;,&quot;custom_domain&quot;:null,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;A weekly newsletter by the CTO of the UK's National Cyber Security Centre.\n\nSummarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates and have awareness of wider going on.&quot;,&quot;logo_url&quot;:null,&quot;author_id&quot;:177420441,&quot;theme_var_background_pop&quot;:&quot;#6B26FF&quot;,&quot;created_at&quot;:&quot;2023-10-25T12:07:22.873Z&quot;,&quot;rss_website_url&quot;:null,&quot;email_from_name&quot;:&quot;Ollie Whitehouse at NCSC - Weekly Cyber Defence Analysis&quot;,&quot;copyright&quot;:&quot;NCSC&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://ctoatncsc.substack.com/p/cto-at-ncsc-summary-week-ending-october?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><span></span><span class="embedded-post-publication-name">CTO at NCSC - Cyber Defence Analysis</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">CTO at NCSC Summary: week ending October 29th</div></div><div class="embedded-post-body">Welcome to the weekly highlights and analysis of the blueteamsec subreddit (and my wider reading). Not everything makes it in, but the best bits do. Firstly, welcome to the new home but same format for those that have followed here from the old Substack&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 years ago &#183; 1 like &#183; 1 comment &#183; Ollie Whitehouse</div></a></div>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-d5b">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: we are on the move...]]></title><description><![CDATA[New job and new home...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-we-are-on-the-move</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-we-are-on-the-move</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Wed, 25 Oct 2023 12:48:34 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7c28bf95-df66-4a76-9420-55f4d0868db9_275x183.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>A quick note to say the new Substack is now setup, we are on the move and I am looking to publish this week as normal.</p><p>You can find the new Substack here</p><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:2057566,&quot;name&quot;:&quot;CTO at NCSC - Cyber Defence Analysis&quot;,&quot;logo_url&quot;:null,&quot;base_url&quot;:&quot;https://ctoatncsc.substack.com&quot;,&quot;hero_text&quot;:&quot;A weekly newsletter by the CTO of the UK's National Cyber Security Centre.\n\nSummarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates.&quot;,&quot;author_name&quot;:&quot;Ollie Whitehouse&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:null,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://ctoatncsc.substack.com?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><span class="embedded-publication-name">CTO at NCSC - Cyber Defence Analysis</span><div class="embedded-publication-hero-text">A weekly newsletter by the CTO of the UK's National Cyber Security Centre.

Summarised cyber defence technical content to help operational blue and purple teams be informed and protect their estates.</div><div class="embedded-publication-author-name">By Ollie Whitehouse</div></a><form class="embedded-publication-subscribe" method="GET" action="https://ctoatncsc.substack.com/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><p>See you there.. </p>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-we-are-on-the-move">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending October 22nd]]></title><description><![CDATA[When video game developer security and real-world attacks become a thing..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-771</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-771</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 20 Oct 2023 19:26:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!iBJC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F499c1911-0c5e-4376-94f3-1e6ef7f0985c_1024x427.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week multiple developers had their Steam accounts compromised and the games backdoored resulting in Valve <a href="https://twitter.com/simoncarless/status/1711841332124336520?t=h7tOvY-Y9qUwzOPwVYPUfQ&amp;s=19">introducing mandatory SMS MFA</a> in response. Then we had the rather large router compromise (see below).</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.cisa.gov/resources-tools/resources/secure-by-design">Secure-by-Design</a> - we&#8217;ve gone big here - no turning back!</p></li><li><p><a href="https://www.gov.uk/government/news/new-commander-of-the-national-cyber-force-appointed">New Commander of the UK&#8217;s National Cyber Force appointed</a> - <em>Air Vice-Marshal Tim Neal-Hopes OBE has been appointed</em></p></li><li><p><a href="https://www.euractiv.com/section/cybersecurity/opinion/un-cybercrime-treaty-a-menace-in-the-making/">UN cybercrime treaty: A menace in the making</a> - article covering the below.</p><ul><li><p><a href="https://www.eff.org/deeplinks/2023/09/un-cybercrime-treaty-talks-end-without-consensus-scope-and-deep-divides-about#:~:text=EFF%20continued%20to%20advocate%20for,computer%20or%20device%20functionalities%20to">UN Cybercrime Treaty Talks End Without Consensus on Scope And Deep Divides About Surveillance Powers </a>- <em>It became apparent that many nations, including Russia, Eritrea, Burundi, Sierra Leone, Zimbabwe, Ghana, Korea, and others, were vying to expand the proposed treaty's surveillance scope to cover practically any offense imaginable where a computer wa&#8230;</em></p></li></ul></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-771">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending October 15th]]></title><description><![CDATA[Who is attacking Russia's semiconductor industry?]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-73c</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-73c</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 12 Oct 2023 18:39:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XgWw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffa5eae33-5bde-420a-8c15-4b235c5f388e_1536x2048.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week was the disclosure of the massive Distributed Denial of Service due a property of the HTTP2 protocol which was <a href="https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/">discovered and used</a> in the wild against numerous large platforms.</p><p>In the high-level this week:</p><ul><li><p><a href="https://committees.parliament.uk/work/7934/cyber-resilience-of-the-uks-critical-national-infrastructure/">Cyber resilience of the UK's critical national infrastructure</a> - UK Parliament - call for evidence in the UK</p></li><li><p><a href="https://www.elliptic.co/blog/record-7-billion-in-crypto-laundered-through-cross-chain-services">Record $7 billion in crypto laundered through cross-chain services </a>- <em>Cross-chain crime refers to the swapping of cryptoassets between different tokens or blockchains &#8211; often in rapid succession and with no legitimate business purpose</em></p></li><li><p><a href="http://isitlegaltopay.com/">Is it legal to pay ransomware where you are?</a> - an open source <a href="https://github.com/rkovar/ransomwarelegality">project</a></p></li><li><p><a href="https://www.europarl.europa.eu/thinktank/en/document/IPOL_STU(2023)740098#:~:text=The%20European%20Union%20has%20taken,equitable%20conditions%20for%20data%20sharing">The emergence of non-personal data markets</a> - <em>The data economy in the transport and mobility sector is one of the five fastest growing and is expected to expand to nearly &#8364;25 billion annually by 2025. Data includes &#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-73c">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending October 8th]]></title><description><![CDATA[Gaining assurance on if you did or did not have a security event when your SaaS vendor discloses a vulnerability is the new game for 2023]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-e48</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-e48</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 06 Oct 2023 18:50:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!1QKW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae55f02-1f3c-4f36-bdda-beca73ef5c65_3840x2440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week you will see some crunchy vulnerabilities had exploits released. One of these raised a question around vendor language in relation to the SaaS services - namely you are not vulnerable  not that you weren&#8217;t vulnerable. This then raised the second order question when these type of vulnerabilities land do we need clearer communication around if as the customer we were vulnerable, when, what the IoCs were and if we have access to logs which allow us to confirm if exploitation happened in our context or not.</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.ncsc.gov.uk/news/uk-us-host-international-dialogue-advance-cyber-support-for-strengthen-democracy">UK and US host international dialogue to advance cyber support for groups that strengthen democracy</a> - <em>Agency heads from nine countries share insights and approaches to help improve collective cyber resilience of global democracy.</em></p></li><li><p><a href="https://www.youtube.com/live/tJnMlPydBak?feature=shared">NPC Headliner Luncheon: Gen. Paul Nakasone</a> - <em>technology is adv&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-october-e48">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending September 31st]]></title><description><![CDATA[Scarcity or constrained access to technology risks driving lateral thinking and innovation...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-cd9</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-cd9</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 29 Sep 2023 18:52:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!6HzA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F927100d7-a191-44b7-8de6-07d26a982180_1375x559.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week you will see there are material levels of reporting on nation state activity. </p><p>In the high-level this week:</p><ul><li><p><a href="https://www.ncsc.gov.uk/blog-post/data-driven-cyber-empowering-security-focused-insights">Data-driven cyber: empowering government security with focused insights from data</a><strong> -</strong> <em>How 'small but actionable' insights can improve behaviours and decision making.</em></p></li><li><p><a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_ATA(2023)753929">The US cybersecurity posture under Biden</a> - from the European Parliament Think Tank - <em>The Biden administration inherited considerable cybersecurity challenges. According to a 2021 US Government Accountability Office (GAO) report, previous governmentsfailed to implement many of the GAO's 2018 recommendations to take 10 critical actions in response to 4 major cybersecurity challenges</em></p><ul><li><p><a href="https://www.lawfaremedia.org/article/the-biden-administration-s-implementation-plan-for-the-national-cybersecurity-strategy">The Biden Administration&#8217;s Implementation Plan for the National Cybersecurity Strategy</a> - a summary and analysis - <em>&#8220;it should not be assumed that just because the implementatio&#8230;</em></p></li></ul></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-cd9">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending September 24th ]]></title><description><![CDATA[The amount of commercial mobile capability both on show and burnt this week is material..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-b1f</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-b1f</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 22 Sep 2023 19:36:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ocdz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F90fdd19b-2447-4d5c-9786-09d2c263f6d7_1734x546.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week you will see there was a lot of nation state focused reporting, outside of that the amount of commercial mobile capability both on show and burnt is material&#8230;</p><p>In the high-level this week:</p><ul><li><p><a href="https://federalnewsnetwork.com/technology-main/2023/09/nsa-plans-new-innovation-pipeline-to-focus-on-china/?readmore=1">NSA plans new &#8216;innovation pipeline&#8217; to focus on China</a> - <em>David Frederick, the NSA&#8217;s assistant deputy director for China, said the new program will be called &#8220;Red Ventures.&#8221; .. The National Security Agency&#8217;s China directorate will soon launch an &#8220;innovation pipeline&#8221; focused on the competition with China and solving the NSA&#8217;s most pressing challenges.</em></p></li><li><p><a href="https://www.defense.gov/News/Releases/Release/Article/3523199/dod-releases-2023-cyber-strategy-summary/">DOD Releases 2023 Cyber Strategy Summary</a> - <em>"This strategy draws on lessons learned from years of conducting cyber operations and our close observation of how cyber has been used in the Russia-Ukraine war,"</em></p><ul><li><p><a href="https://www.scmp.com/news/china/military/article/3234462/pentagon-says-cyberattacks-are-part-chinas-armory-any-conflict-us?utm_source=substack&amp;utm_medium=email">Pentagon says cyberattacks are part of China&#8217;s armory for conflict with US</a> </p></li><li><p><a href="https://edition.cnn.com/2023/09/12/politics/department-of-defense-cyber-strategy-china/index.html">Pentagon v&#8230;</a></p></li></ul></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-b1f">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending September 17th ]]></title><description><![CDATA[The UK's ICO commits to exploring how it can demonstrate that meaningful engagement with the NCSC will reduce regulatory penalties.]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-97a</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-97a</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Wed, 13 Sep 2023 17:56:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yKm7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6223523-49cd-4a3a-bbf4-d942240e8729_871x511.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week nothing overly standout. </p><p>In the high-level this week:</p><ul><li><p>The UK&#8217;s <a href="https://www.ncsc.gov.uk//news/ncsc-ceo-and-information-commissioner-sign-memorandum-of-understanding">NCSC CEO and Information Commissioner sign Memorandum of Understanding</a> -  credit with the ICO if you tell the NCSC you had a breach.</p><ul><li><p>Related <a href="https://therecord.media/ransomware-attacks-record-in-UK">Ransomware attacks hit record level in UK, according to neglected official data</a></p></li></ul></li><li><p><a href="https://www.cybercom.mil/Media/News/Article/3522801/building-resilience-us-returns-from-second-defensive-hunt-operation-in-lithuania/">&#8220;Building Resilience&#8221;: U.S. returns from second defensive Hunt Operation in Lithuania</a> - <em>CNMF has deployed 50 times and conducted hunt operations on over 75 networks in more than 23 countries</em>.</p></li><li><p><a href="https://archive.ph/X1pPH">As China steps up cybersecurity enforcement, smaller businesses are feeling the heat</a> - <em>Last month, police in the city of Zhenjiang, in the eastern province of Jiangsu, carried out security sweeps at local businesses, issuing warnings to those that offered Wi-fi without requiring real-name registration, local media reported on Monday.</em></p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/12/cisa-releases-its-open-source-software-security-roadmap">CISA Releases its Op&#8230;</a></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-97a">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending September 10th ]]></title><description><![CDATA[Sweden has a Psychological Defence Agency...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-494</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-494</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Sat, 09 Sep 2023 18:53:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!5Bm_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbed6e290-4a92-4e0f-bb50-68d9e9469b21_1024x718.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week you will see some of the exploitation is rather sophisticated (and not in the we have been hacked by a sophisticated threat actor sense). Outside of that it is business as usual although defensive tradecraft on show in some places is great..</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.youtube.com/watch?v=t7zHVdIEmDc">KBS is a South Korean public broadcast service segment on Cyber and North </a><a href="https://www.youtube.com/watch?v=t7zHVdIEmDchttps://www-mofa-go-jp.translate.goog/mofaj/press/release/press1_001546.html?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">Korean activity</a> - you can use auto translated closed captions to understand.</p></li><li><p><a href="https://www.gov.uk/government/news/uk-sanctions-members-of-russian-cybercrime-gang">UK sanctions members of Russian cybercrime gang</a><strong> - </strong>love that we (the UK) have started to financially sanction along with the US cyber actors.</p></li><li><p><a href="https://www.youtube.com/watch?v=t7zHVdIEmDchttps://www-mofa-go-jp.translate.goog/mofaj/press/release/press1_001546.html?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">Japan imposes financial sanctions on North Korea</a> - includes crypto asset addresses used to direct/collect hacked funds.</p></li><li><p><a href="https://www.abc.net.au/news/2023-09-01/australia-owned-pacific-mobile-network-likely-exploited-by-spies/102784160">'Blatant and malicious': Telstra-owned Digicel Pacific used by spies-for-hire, cyber security analysis shows</a> - enabled various offensive operations i&#8230;</p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-494">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending September 3rd ]]></title><description><![CDATA[It is just busy...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-ca2</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-ca2</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 01 Sep 2023 13:55:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!8IXX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F895de6ac-6501-4033-9725-1db80a099952_2000x1755.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week you will see the volume of reporting on all fronts feels busy. The points I would note are the mobile / embedded focus of some of the capability.</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.congress.gov/bill/118th-congress/house-bill/5255/text">Federal Cybersecurity Vulnerability Reduction Act of 2023</a> - <em>proposed legislation in the Unites States requiring vulnerability disclosure by all Federal contractors</em></p></li><li><p><a href="https://www.cybercom.mil/Media/News/Article/3505610/us-conducts-first-hunt-forward-operation-in-lithuania/">U.S. conducts first Hunt Forward Operation in Lithuania</a> - <em>For three months, the U.S. cyber operators hunted for malicious cyber activity on key Lithuanian national defense systems and Ministry of Foreign Affairs&#8217; networks alongside its allies.</em></p></li><li><p><a href="https://www.justice.gov/usao-cdca/pr/qakbot-malware-disrupted-international-cyber-takedown">Qakbot Malware Disrupted in International Cyber Takedown</a> - <em>The Qakbot malicious code is being deleted from victim computers, preventing it from doing any more harm. The Department also announced the seizure of more than $8.6 million in cryptocurren&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-september-ca2">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending August 27th]]></title><description><![CDATA[Chinese supply chain attack using signed code...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-672</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-672</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 24 Aug 2023 12:22:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!3KGO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7317350-a822-4c2c-8e51-bb9199e3e146_3840x1432.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week the Chinese reporting is of note including the use of signed code in a supply chain attack against South East Asian targets.</p><p>In the high-level this week:</p><ul><li><p><a href="https://archive.ph/5qlgq#selection-859.0-859.58">Exposed: the Chinese spy using LinkedIn to hunt UK secrets</a> - <em>believed to have initially focused on defence contractors, civil servants and targets in sensitive business areas. He has since switched to targeting think tanks and academics who are still considered vulnerable and do not always realise the value of the information they possess.</em></p></li><li><p><a href="https://www-ichannela-com.translate.goog/news/main/news_detailPage.do?publishId=000000363086&amp;_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en-US&amp;_x_tr_pto=wapp">First discovery of 'spy chip' in Chinese weather equipment</a><strong> - </strong><em>The National Intelligence Service recently discovered a backdoor that allows wireless eavesdropping or hacking in the weather observation equipment of public institutions in Korea.</em></p></li><li><p>UK&#8217;s National Cyber Security Center has launched its <a href="https://www.ncsc.gov.uk/collection/problem-book">research problem book </a>along with a suppo&#8230;</p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-672">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending August 20th]]></title><description><![CDATA[Uptick in reporting on criminal targeting of Critical National Infrastructure should focus our minds..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-487</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-487</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Sun, 20 Aug 2023 06:44:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!yy2E!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F491388d4-ae22-4fd7-bc08-002f8110c0a3_1050x957.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week nothing overly of note, the usual cyber cha cha cha continues. Well that and what seems to be an uptick in criminal CNI targeting as evidenced by the reporting contained within.</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.csis.org/analysis/front-row-view-nsa-reflections-general-paul-m-nakasone">A Front Row View of the NSA: Reflections from General Paul M. Nakasone</a>  (<a href="https://www.csis.org/events/front-row-view-nsa-reflections-general-paul-m-nakasone">video also available</a>) - &#8220;<em>I think the first thing I would say on SolarWinds is when you&#8217;re doing an intelligence operation, you never want to get caught. And they got caught. And so I think that should be perhaps the story that goes with SolarWinds</em>&#8221;</p></li><li><p><a href="https://archive.ph/5o7qd">White House orders federal agencies to shore up cybersecurity, warns of potential exposure</a> - &#8220;<em>Multiple federal departments and agencies have, as of the end of June, &#8220;failed to fully comply&#8221; with critical security practices prescribed by the executive order, &#8220;leaving the U.S. Government exposed to mal&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-487">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending August 13th]]></title><description><![CDATA[US doing what it does best... going big... on cyber on all fronts...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-0f8</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-0f8</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 10 Aug 2023 11:54:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!I4bq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F91ad8585-be4f-4dec-9b6e-9933896b7451_1148x923.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week nothing overly of note, the usual cyber conga lines moves on and on.. </p><p>In the high-level this week:</p><ul><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/09/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software/">Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America&#8217;s Critical Software </a></p><ul><li><p>the above announces <a href="https://aicyberchallenge.com/">DARPA&#8217;s AI Cyber Challenge (AIxCC) </a></p></li></ul></li><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/">Biden-Harris Administration Launches New Efforts to Strengthen America&#8217;s K-12 Schools&#8217; Cybersecurity</a> - <em>up to $200 million over three years to strengthen cyber defenses in K-12 schools and libraries in tandem with other federal agencies that have deep expertise in cybersecurity.</em></p></li><li><p><a href="https://www.dhs.gov/news/2023/08/07/dhs-announces-additional-3749-million-funding-boost-state-local-cybersecurity">DHS Announces Additional $374.9 Million in Funding to Boost State, Local Cybersecurity</a> - <em>a first-of-its-kind cybersecurity grant program specifically for state, local, and territorial (SLT) governments across the country to help them strengthen their cyber resilience</em></p></li><li><p><a href="https://archive.ph/FxMpM">MOVEit hack s&#8230;</a></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-0f8">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending August 6th]]></title><description><![CDATA[When is a breach considered detected? SEC clocks start ticking then..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-b85</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-b85</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Sat, 05 Aug 2023 07:13:08 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Qj4P!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26bc30c5-e859-4fba-a6a1-1f09c40f9114_1600x1289.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week nothing overly of note just the usual tempo of activity. </p><p>In the high-level this week:</p><ul><li><p>The UK has published its <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1175834/2023_NATIONAL_RISK_REGISTER_NRR.pdf">National Risk Register 2023</a> - lots of cyber discussed. </p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/04/cisa-releases-its-cybersecurity-strategic-plan">CISA Released its Cybersecurity Strategic Plan</a> - has three enduring goals</p><ul><li><p><em>Address Immediate Threats</em></p></li></ul><ul><li><p><em>Harden the Terrain </em></p></li><li><p><em>Drive Security at Scale</em></p></li></ul></li><li><p><a href="https://thehill.com/policy/defense/4124037-senate-annual-defense-bill-ndaa-showdown-with-house/">US Senate passes annual defense bill, teeing up showdown with House</a> - directs the Defense Department to ask the National Academy of Public Administration to assess establishing a seventh, cyber-specific military service.</p></li><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/31/fact-sheet-biden-%E2%81%A0harris-administration-announces-national-cyber-workforce-and-education-strategy-unleashing-americas-cyber-talent/">FACT SHEET: Biden-Harris Administration Announces National Cyber Workforce and Education Strategy, Unleashing America&#8217;s Cyber Talent</a> - <em>a first-of-its-kind comprehensive approach aimed at addressing both&nbsp; immediate and long-term cyber workforce needs</em></p><ul><li><p><a href="https://www.gov.uk/government/publications/cyber-security-skills-in-the-uk-labour-market-2023">Cyber security skills in the UK labour market 2023</a> - <em>&#8230;</em></p></li></ul></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-august-b85">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending July 30th]]></title><description><![CDATA[Another busy week in the merry-go-round of cyber..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-c40</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-c40</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 28 Jul 2023 12:56:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0Zl_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F593e1101-0014-4749-8dc6-6a11ae73c1aa_1864x832.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week the understand and implications of the Exchange online compromise continues. Details such as the <em><a href="https://archive.ph/eAlWa">U.S. Ambassador to China Hacked in China-Linked Spying Operation</a></em><a href="https://archive.ph/eAlWa"> </a>came to light, then we had the letter from <a href="https://www.wyden.senate.gov/imo/media/doc/wyden_letter_to_cisa_doj_ftc_re_2023_microsoft_breach.pdf">Ron Wyden to CISA</a>. Beyond that we have the MobileIron vulnerability which was used to attack the <a href="https://www.regjeringen.no/en/aktuelt/ministries-hit-by-cyber-attacks/id2990098/">Norwegian Government</a> - 12 ministries thus far. This is in addition to the Citrix exploitation (see below). Finally, <a href="https://blog.virustotal.com/2023/07/apology-and-update-on-recent-accidental.html">VirusTotal apologized </a>for leaking some customer information.</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/21/fact-sheet-biden-harris-administration-secures-voluntary-commitments-from-leading-artificial-intelligence-companies-to-manage-the-risks-posed-by-ai/">FACT SHEET: Biden-Harris Administration Secures Voluntary Commitments from Leading Artificial Intelligence Companies to Manage the Risks Posed by AI </a>- <em>The companies commit to internal and external security testing of their AI systems before their release.&nbsp;This testing, which will be carried out in part by independent ex&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-c40">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending July 23th]]></title><description><![CDATA[North Korea and their supply chain attacks Part [number]..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-01c</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-01c</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 20 Jul 2023 18:08:47 GMT</pubDate><enclosure url="https://substackcdn.com/image/youtube/w_728,c_limit/qGD93mJ2ZAU" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week <a href="https://jumpcloud.com/blog/security-update-incident-details">JumpCloud issued their incident writeup</a> which has been potentially linked to <a href="https://www.sentinelone.com/labs/jumpcloud-intrusion-attacker-infrastructure-links-compromise-to-north-korean-apt-activity/">North Korea</a> and a whole rash of vulnerabilities we would prefer didn&#8217;t exist in Microsoft Office, Microsoft Outlook and more (see reporting below)..</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/">Biden-&#8288;Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers</a> - <em>&#8220;U.S. Cyber Trust Mark&#8221; is the latest in a series of actions President Biden and the Biden-Harris Administration have taken to protect hard-working families.</em></p></li><li><p><a href="https://www.whitehouse.gov/oncd/briefing-room/2023/07/19/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-harmonizing-cybersecurity-regulations/">Fact Sheet: Office of the National Cyber Director Requests Public Comment on Harmonizing Cybersecurity Regulations</a> - <em>request for information (RFI) on cybersecurity regulatory harmonization and regulatory reciprocity. The&nbsp; RFI builds on the commitment the Administration made in the National Cybers&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-01c">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending July 16th]]></title><description><![CDATA[Chinese actor #1 acquired Microsoft account (MSA) consumer signing key. Chinese actor #2 spotted and exploited a loophole in Microsoft Windows kernel driver singing - ye ha!]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-428</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-428</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Thu, 13 Jul 2023 16:17:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!_5-I!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F47929abb-50b6-4e96-8938-13afe6a12c11_1200x718.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week it has been about the fact that a Chinese APT managed to forge authentication tokens through acquired a Microsoft account (MSA) consumer signing key leading e-mail access (see reporting below). That and the rash of vulnerabilities in web based file sharing platforms continues and the fact a Chinese threat actor found a loophole in Microsoft Windows Kernel driver signing. Our thoughts are with MSRC this week..</p><p>In the high-level this week:</p><ul><li><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/">FACT SHEET: Biden-&#8288;Harris Administration Publishes the National Cybersecurity Strategy Implementation&nbsp;Plan</a> - <em>The Department of State will publish an International Cyberspace and Digital Policy Strategy that incorporates bilateral and multilateral activities. State will also work to catalyze the development of staff knowledge and skills related to cyberspace and digital policy that can&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-428">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending July 9th]]></title><description><![CDATA[US Government being held to quantifiable objectives and delivery ownership for its cyber strategy...]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-2b5</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-2b5</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Sun, 09 Jul 2023 07:18:12 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!naKh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week it has been about the Jumpcloud incident who released this note.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!naKh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!naKh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 424w, https://substackcdn.com/image/fetch/$s_!naKh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 848w, https://substackcdn.com/image/fetch/$s_!naKh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!naKh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!naKh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg" width="404" height="465.23125" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:737,&quot;width&quot;:640,&quot;resizeWidth&quot;:404,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Post image&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Post image" title="Post image" srcset="https://substackcdn.com/image/fetch/$s_!naKh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 424w, https://substackcdn.com/image/fetch/$s_!naKh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 848w, https://substackcdn.com/image/fetch/$s_!naKh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!naKh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff18adf71-398a-4f6b-8c4f-6b3803c7a6d5_640x737.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the high-level this week:</p><ul><li><p><a href="https://www.aic.gov.au/publications/sr/sr43">Cybercrime in Australia 2023</a> - <em>Overall, 47 percent of respondents experienced at least one cybercrime in the 12 months prior to the survey&#8212;and nearly half of all victims reported experiencing more than one type of cybercrime. Thirty-four percent of respondents had experienced a data breach.</em></p></li><li><p><a href="https://www.gao.gov/products/gao-23-106826">Cybersecurity: Launching and Implementing the National Cybersecurity Strategy </a>- from the US Government Accountability Office - <em>This Snapshot covers the status of the National Cybersecurity Strategy. The strategy's goals and strategic objectives provide a good foundation, but the Administration needs to establish specific objectives and performance measures, resource requirements, and roles and responsibilities</em></p></li><li><p><a href="https://datamatters.sidley.com/2023/06/29/sec-delays-enactment-of-cyber-rules-related-to-investment-adviser-and-public-companies-to-october-2023-updates-timeline-to-april-2024-for-recently-proposed-cybersecurity-rules/">SEC Delays Enactment of Cyber R&#8230;</a></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-2b5">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending July 2nd]]></title><description><![CDATA[When Wagner cybers Russia.. allegedly..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-770</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-770</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 30 Jun 2023 13:46:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ZYaJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5b65785d-9160-4dfc-926b-893e7336876e_2911x1339.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week week nothing out of the ordinary except <a href="https://www-dsnews-ua.translate.goog/world/hakeri-vagnera-atakuvali-ob-yekti-kritichnoji-infrastrukturi-rosiji-29062023-482556?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">Wagner apparently taking down the DoZor satellite provider</a>, which serves Russian state critical infrastructure facilities.. the ying/yang of cyber continues. </p><p>In the high-level this week:</p><ul><li><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/06/M-23-18-Administration-Cybersecurity-Priorities-for-the-FY-2025-Budget-s.pdf">US Cyber Investment Priorities</a> - the counter ransomware being the most interesting -</p><ul><li><p><em>prioritize staff to investigate ransomware crimes and disrupt ransomware infrastructure and actors; </em></p></li><li><p><em>prioritize staff to combat the abuse of virtual currency to launder ransom payments; and</em></p></li><li><p><em> ensure participation in interagency task forces focused on cybercrime</em></p></li></ul></li><li><p><a href="https://www.armed-services.senate.gov/imo/media/doc/fy2024_ndaa_executive_summary.pdf">US fiscal 2024 National Defense Authorization Act (NDAA)</a> - requires the Defense Department to study the viability of creating a separate, uniformed Cyber Force</p></li><li><p><a href="https://archive.ph/DUKJv#selection-341.0-341.83">Australia names air force veteran as cybersecurity chief amid rise in data breaches</a> - <em>Air Marshal Da&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-july-770">
              Read more
          </a>
      </p>
   ]]></content:encoded></item><item><title><![CDATA[Bluepurple Pulse: week ending June 25th]]></title><description><![CDATA[DDoS can have global cloud scale impact in 2023..]]></description><link>https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-june-64e</link><guid isPermaLink="false">https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-june-64e</guid><dc:creator><![CDATA[Ollie]]></dc:creator><pubDate>Fri, 23 Jun 2023 13:59:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4dE9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F014fc6a2-e952-44f5-a7ec-410828a1e0d8_739x419.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Welcome to the weekly highlights and analysis of the&nbsp;<a href="https://www.reddit.com/r/blueteamsec/">blueteamsec</a>&nbsp;subreddit (and my wider reading). Not everything makes it in, but the best bits do.</p><p>Operationally this week the usual constant contact of chaos but not anything overly standout other than Microsoft&#8217;s revelation of the <a href="https://msrc.microsoft.com/blog/2023/06/microsoft-response-to-layer-7-distributed-denial-of-service-ddos-attacks/">DDoS attacks Azure experienced and the resulting impact in early June</a>. That and fact there continues to be more <a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-15June2023">MOVEit vulnerabilities</a> - an exemplar of vuln surging in action.. </p><p>In the high-level this week:</p><ul><li><p><a href="https://www.gov.uk/government/news/uk-to-give-ukraine-major-boost-to-mount-counteroffensive">UK to give Ukraine major boost to mount counteroffensive</a> - <em>Up to &#163;25 million expansion to harden Ukraine&#8217;s cyber defences as Russia continues its callous attacks</em></p></li><li><p><a href="https://www.justice.gov/opa/pr/justice-department-announces-new-national-security-cyber-section-within-national-security">Justice Department Announces New National Security Cyber Section Within the National Security Division</a><strong> -</strong> <em>This new section will allow NSD to increase the scale and speed of disruption campaigns and prosecutions of nation-state threat actors, state-sponsored cybercriminals, associated money launderers, and other cyber-enabled threats to national secur&#8230;</em></p></li></ul>
      <p>
          <a href="https://bluepurple.binaryfirefly.com/p/bluepurple-pulse-week-ending-june-64e">
              Read more
          </a>
      </p>
   ]]></content:encoded></item></channel></rss>