skip to main |
skip to sidebar
A Change In Tactics
Aurora Report Mission
The original mission of Aurora Report was to monitor daily security news and report on the aspects of that news that was relevant to my current work situation. Since the begining of this effort I have attempted to proliferate the global security events that are/were occuring to as many colleagues as would listen. At times I felt quite the boy calling wolf, and yet in others very satisfied that I had brought forth timely and accurate knowledge.
One aspect of this endeavor that has not been quite what I intended is the growing volume of articles in the posts as well as the ever increasing number of sources. The last post "Around The Horn vol.2,5" had over 200 articles and the current issue if ever published has upwards of 350. This is unmanageable for the reader and has the effect of displacing the desired results of this blog.
What is to be done now?
As a result of the ever increasing number of security relevant sources of information I have decided to try and refocus on the original mission. Therefore I have published as a feature of this blog all of my currently followed blogs. Those of you that miss my aggregation can now either use Aurora Report as a jumping off point or you can use a feed reader like Google Reader or BlogLines to follow these feeds on your own.
I will try to scour through the relevant articles that either interest me or have direct impact on current situational challenges. I will build on these to publish a semi-regular post replete with my research and conclusions on the matter. After all that is really what a blog is supposed to be.
Enjoy!
My Blog List
-
PwC on using AI to turn cybersecurity risk into competitive advantage
-
PwC supports clients across the full cyber lifecycle
*Sponsored Post* Managing cybersecurity risk has never been simple, but in
today's threat landscape i...
3 hours ago
-
-
Microsoft Patch Tuesday, December 2025 Edition
-
Microsoft today pushed updates to fix at least 56 security flaws in its
Windows operating systems and supported software. This final Patch Tuesday
of 2025 ...
6 days ago
-
We have achieved FreeBSD 15.0-REL with KDE Plasma
-
Houston, we have installed #FreeBSD 15.0-REL with KDE Plasma 6.4.5 on a
Lenovo ThinkPad X1 Carbon Gen 6 laptop.
I have come full circle. I used to dail...
2 weeks ago
-
Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a
Category 3 Supply Chain Breach Looks Like
-
Systemic ransomware events in 2025, how Jaguar Land Rover’s shutdown
exposed Category 3 supply chain risk, with lessons from Toyota, Nissan and
Ferrari.
2 weeks ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7
-
Here are the answers for The New York Times Mini Crossword for Oct. 7.
2 months ago
-
Today's NYT Mini Crossword Answers for Tuesday, Oct. 7
-
Here are the answers for The New York Times Mini Crossword for Oct. 7.
2 months ago
-
Announcing SecTemplates.com release #6: Security Partner Program Pack v1
-
I have built several security partner programs at companies such as Box
Inc. and Coinbase, with over 8 years of experience leading them. I have
consistentl...
6 months ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb
7th)
-
Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But
I have no idea what this URL may be associated with. Based on some
googleing, I ...
1 year ago
-
Comic for March 12, 2023
-
Dilbert readers - Please visit Dilbert.com to read this feature. Due to
changes with our feeds, we are now making this RSS feed a link to
Dilbert.com.
2 years ago
-
87% of Container Images in Production Have Critical or High-Severity
Vulnerabilities
-
At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed
how to shore up the software supply chain.
2 years ago
-
Vulnerability Summary for the Week of November 29, 2021
-
Original release date: December 6, 2021
High Vulnerabilities
Primary
Vendor -- Product Description Published CVSS Score Source & Patch Info
abb -- rtu50...
4 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine
ServiceDesk Plus
-
Original release date: December 2, 2021
Summary
*This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics,
Techniques, and Common Knowledge (AT...
4 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim
-
Posted by InfoSec News on Aug 12
https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/
By Danny Palmer
Z...
5 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security
-
There are reasons to embrace it. There are reasons to be wary of it. Here's
the breakdown.
6 years ago
-
Privacy and Mobile Device Apps
-
Original release date: July 9, 2019 | Last revised: November 15, 2019
What are the risks associated with mobile device apps?
Applications (apps) on your sm...
6 years ago
-
44CON 2018 - 12th-14th September, London (UK)
-
Posted by Steve on Feb 28
44CON 2018 is the UK's best annual Security Conference and Training event.
The conference spans 2.5 days with training
on the 1...
7 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability
-
Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1
BER decoding routine. The library will allocate a memory block based on the
leng...
8 years ago
-
V2V Communications security considerations
-
The future of vehicles, road infrastructure and driving are changing. We
are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure
(V2I) ...
8 years ago
-
vTech – ignorance is no defence (and neither are weasel words)
-
This morning, Troy Hunt published a blog post alerting to a recent change
in the Terms & Conditions published by children’s toy manufacturer vTech.
The cha...
9 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence
-
The U.S. Justice Dept. said it was "looking into the issues" raised by an
Reuters story, that one of its law enforcement agencies collaborated with
the NSA...
12 years ago
-
News: Change in Focus
-
Change in Focus
15 years ago
-
-
-
-
-
-
-
-
No comments:
Post a Comment