

Threat Actors With A Thousand Names - PSW #856
8 snips Jan 9, 2025
Discover the vulnerabilities lurking in DNA sequencers and the urgent need for better security measures. The complexities of naming threat actors reveal both chaos and confusion in cybersecurity. Reflecting on a CEO's unexpected passing adds a emotional layer to industry discussions. Explore how stolen bicycles link to social media accountability. A peculiar bug causes printing woes on Tuesdays, while hackers continue to exploit weaknesses in technologies like Bitlocker and Bluetooth. Plus, get hype for ShmooCon and hear about the latest tech threats!
AI Snips
Chapters
Transcript
Episode notes
Threat Actor Naming
- Threat actor naming conventions are a mess, causing confusion in cybersecurity.
- A proposed standard suggests single, non-dictionary words, which is impractical.
CVE-like System for Threats
- CVEs provide unique identifiers for vulnerabilities, despite some flaws.
- A similar system is needed for threat actors, botnets, and malware, possibly with different prefixes.
Code Names as Marketing
- Code names for threat actors, like those used by Microsoft (e.g., typhoons), have become marketing tools.
- This hinders clear identification and tracking, which should be the primary goal.