

One idea being floated to address the gap is the creation of a Civilian Cyber Security Reserve.

Cyber Seek, a project that tracks the cyber security industry sponsored by the federal National Institute of Standards and Technology (NIST), reports more than a half million cyber security jobs left unfilled despite demand and ample corporate cyber security budgets. “Barely able to keep up.” With ransomware clearly established as a major national security threat this year, the cyber security industry and top cyber security executives are struggling to find enough capacity to man the battle lines. The tech site Bleeping Computer posited that only two companies paid a ransom out of an estimated 1,500 victims. As a result, fewer companies might have felt pressure to pay up since they could restore their networks from backups. In the Kaseya attack, the REvil gang eschewed these practices, exploiting a zero-day vulnerability in the VSA servers to automate the attack without accessing the individual victims’ networks. The company urged VSA users to shut down their VSA servers to prevent them from being compromised-a move that initially affected at least 36,000 companies.Īs new trends are showing, ransomware gangs will often take the time to steal data and delete backups before they encrypt victim’s devices, providing a stronger incentive to pay up to ensure restoration.

#JACK CABLE STAMOS RANSOMWHERE SOFTWARE#
Experts likened the incident to the SolarWinds supply chain ransomware hit, which impacted an entire ecosystem of companies using a Trojanized software update. From what we know so far, the attackers leveraged a vulnerability in Kaseya’s VSA endpoint management, protection, and networking monitoring platform. The attackers were reported to be the REvil Russia-linked hacking group responsible for other recent high-profile attacks such as the one on meat processor JBS.

The supply chain attack began with a supply-chain attack against Kaseya, an IT management software provider that caters to enterprise IT teams and managed software providers (MSPs). The latest big ransomware attack may have affected between 800 and 1,500 companies around the world. Reaffirming the crucial role of security research in response to a Supreme Court Amicus Brief, with overĥ0 signatories including Congressman Jim Langevin.Cyber security fireworks. Launched Ransomwhere, the first website to publicly track ransomwareĭiscovered a temporary workaround to a nascent ransomware strain, saving 50 victims $27,000 Led development and deployment of CISA's first passive, opt-out vulnerability scanning program with Crossfeed, assessing all 50 states and over 2,500 countiesĪdvised the IT-ISAC on rebuilding relationships betweenĬommunity and elections industry, leading to the adoption The Stanford Empirical Security Research Group and the Stanford Internet Observatory Some of my work: Jack studied computer science at Stanford, where he worked as a researcher Including Google, Facebook, Uber, Yahoo, and the U.S. Jack is also a top-ranked bug bounty hunter, having identified over 350 vulnerabilities in companies Portfolio, advised on the next iteration of the DoD Helped run the Hack the Pentagon bug bounty Jack joined the Defense Digital Service out of high school, where he Security Architect at Krebs Stamos Group.īefore that, Jack served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide. Jack Cable is a computer scientist and security researcher, currently a Fellow with
