PeopleCert

PeopleCert books are now on Amazon!

PeopleCert recently joined Amazon as a seller! This means that we can now instantly order our Official ITIL, PRINCE2 and other books—without purchasing a certification. Delving into these high-quality materials at your own pace before committing to a certification enables you to tailor your learning journey to your individual needs.   We’ll be adding new stock to our store, so have a look at our books on Amazon today and spread the word!     Browse PeopleCert books

Threat Modeling

Threat Modeling

Threat modeling is a core element of the Microsoft Security Development Lifecycle (SDL). It’s an engineering technique you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that could affect your application. You can use threat modeling to shape your application’s design, meet your company’s security objectives, and reduce risk.

There are five major threat modeling steps:

  •  Defining security requirements. 
  •  Creating an application diagram. 
  •  Identifying threats. 
  •  Mitigating threats. 
  •  Validating that threats have been mitigated. 

Threat modeling should be part of your routine development lifecycle, enabling you to progressively refine your threat model and further reduce risk.

Microsoft Threat Modeling Tool

The Microsoft Threat Modeling Tool makes threat modeling easier for all developers through a standard notation for visualizing system components, data flows, and security boundaries. It also helps threat modelers identify classes of threats they should consider based on the structure of their software design. We designed the tool with non-security experts in mind, making threat modeling easier for all developers by providing clear guidance on creating and analyzing threat models. 

The Threat Modeling Tool enables any developer or software architect to:

  • Communicate about the security design of their systems. 
  • Analyze those designs for potential security issues using a proven methodology. 
  • Suggest and manage mitigations for security issues. 

The SDL Threat Modeling Tool plugs into any issue-tracking system, making the threat modeling process a part of the standard development process.

social engineering

What Is Social Engineering?

In social engineering attacks, scammers impersonate trusted officials, like customer service representatives at a bank, to con unsuspecting victims out of millions of dollars every year. The “engineering” part doesn’t have to be technical in these types of attacks, which is part of what makes them such a pervasive threat. By pretending to be someone else, scammers aim to trick a person into giving them information that they shouldn’t. A social engineer doesn’t need to crack your password. Instead, they try to get you to give it to them over the phone by claiming there’s something wrong with your account, and that they’re here to help.

Impersonation

Impersonation scams

Impersonation scams involve fraudsters pretending to be from trusted organizations or individuals to steal personal information or money. These scams can start with a phone call, text, email, or message that appears to be from a legitimate source, such as a bank, government agency, or well-known business.

Common tactics include posing as a legitimate representative and claiming there is an urgent issue with your account, such as a security breach or unauthorized transaction. Scammers may also use caller ID spoofing to make it appear as if the call is coming from a trusted organization. They might have information about you, like your full name or address, which can make the scam seem more convincing.

To protect yourself, avoid giving out any information, especially passwords, PINs, or verification codes. Be wary of aggressive or urgent language and unusual requests. If you receive a call or message that seems suspicious, hang up and contact the organization directly using a verified phone number or website.

Phishing scams

Phishing Definition

Phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, or any form of communication. A phishing attack aims to trick the recipient into falling for the attacker’s desired action, such as revealing financial information, system login credentials, or other sensitive information. Many are used to confirm an email address or a telephone number.

As a popular form of social engineering, phishing involves psychological manipulation and deception whereby threat actors masquerade as reputable entities to mislead people into performing specific actions. These actions often involve clicking links to fake websites, downloading and installing malicious programs, or divulging private information, like name, address, bank account numbers or credit card details.

Since the mid-1990s, the term “phishing” has been used to identify hackers who use fraudulent emails to “fish for” information from unsuspecting users. However, phishing attacks have become increasingly sophisticated and are now broken down into different types, including email phishing, spear phishing, smishing, vishing, and whaling. Each type is characterized by specific channels and methods of execution – email, text, voice, social media, etc. – all with a similar underlying intentions.

Microsoft Copilot

What is Microsoft Copilot?

Microsoft Copilot is a generative artificial intelligence chatbot developed by Microsoft, designed to assist users with various tasks and enhance productivity. It integrates with multiple Microsoft applications and services, such as Windows, Microsoft 365, and GitHub, to support user efficiency and productivity.16 Copilot utilizes the Microsoft Prometheus model, which is built upon OpenAI’s GPT-4 foundational large language model and has been fine-tuned using supervised and reinforcement learning techniques.1 The chatbot can generate content, offer suggestions, and automate tasks, and it supports features like creating poems, generating songs, and using numerous languages and dialects.


Introduction to Microsoft 365 Copilot – Training | Microsoft Learn

This module explores the intricacies of Microsoft 365 Copilot, offering insights into its functionality and Microsoft’s dedication to implementing AI responsibly and ethically.


Ask questions and analyze content with Microsoft 365 Copilot – Training | Microsoft Learn

Discover ways to prompt Microsoft 365 Copilot in Word, PowerPoint, Teams, and Outlook to ask, analyze, and receive recommendations for fresh ideas and content. Whether you need specific information, comparative analysis, or helpful suggestions, Copilot is your goto tool.


Prepare your organization for Microsoft 365 Copilot – Training | Microsoft Learn

This learning path examines the Microsoft 365 Copilot design and its security and compliance features, and it provides instruction on how to implement Microsoft 365 Copilot.


Empower your workforce with Microsoft 365 Copilot Use Cases – Training | Microsoft Learn

This Learning Path enables students to perform a series of Use Case exercises that build their Microsoft 365 Copilot skills in various business-related scenarios. Use cases include Executives, Sales, Marketing, Finance, IT, HR, and Operations.


Speach Recognition

To start voice dictation in Windows 11, you can press the Win+H keys together to open the Voice typing tool. Alternatively, you can go to Settings > Accessibility > Speech, and turn on the switch for Windows Speech Recognition. Once enabled, you can click the microphone icon to start dictation in any application where you can type text.

This article is for people who want to control their PC and author text using their voice with Windows. This article is part of the Accessibility support for Windows content set where you can find more information on Windows accessibility features. For general help, visit Microsoft Support home.

Voice access is a feature in Windows 11 that enables everyone to control their PC and author text using only their voice and without an internet connection. For example, you can open and switch between apps, browse the web, and read and author email using your voice. For more information, go to Use voice access to control your PC & author text with your voice.

Voice access is available in Windows 11, version 22H2 and later. For more information on Windows 11 22H2 new features, and how to get the update, see What’s new in recent Windows updates. Not sure which version of Windows you have? See: Find Windows version.

Dictate punctuation marks

To insert thisSay this
.“Period”
“Full stop”
,“Comma”
?“Question mark”
!“Exclamation mark”
“Exclamation point”
‘s“Apostrophe-s”
:“Colon”
;“Semicolon”
” ““Open quotes”
“Close quotes”
“Hyphen”
“Ellipsis”
“Dot dot dot”
‘ ‘“Begin single quote”
“Open single quote”
“End single quote”
“Close single quote”
( )“Left parentheses”
“Open parentheses”
“Right parentheses”
“Close parentheses”
[ ]“Open bracket”
“Close bracket”
{ }“Left brace”
“Open brace”
“Right brace”
“Close brace”

Dictate symbols

To insert thisSay this
*“Asterisk”
\“Backslash”
/“Forward slash”
|“Vertical bar”
“Pipe character”
_“Underscore”
“Paragraph sign”
“Paragraph mark”
§“Section sign”
&“Ampersand”
“And sign”
@“At sign”
©“Copyright sign”
®“Registered sign”
°“Degree symbol”
%“Percent sign”
#“Number sign”
“Pound sign”
+“Plus sign”
“Minus sign”
דMultiplication sign”
÷“Division sign”
=“Equals sign”
< >“Less than sign”
“Greater than sign”
$“Dollar sign”
£“Pound sterling sign”
“Euro sign”
¥“Yen sign”

Manage voice access and microphone

To do thisSay this
Get voice access to listen to you.“Voice access wake up”
“Unmute”
Put voice access to sleep.“Voice access sleep”
“Mute”
Turn off the voice access microphone.“Turn off microphone”
Close voice access.“Turn off voice access”
“Stop voice access”
“Close voice access”
“Exit voice access”
“Quit voice access”
Find out what command to use.“What can I say”
“Show all commands”
“Show command list”
“Show commands”
Access voice access settings menu.“Open voice access settings”
Access voice access help menu.“Open voice access help”
Access the voice access tutorial.“Open voice access guide”
Switch to commands only mode.“Commands mode”
“Switch to command mode”
Switch to dictation only mode.“Dictation mode”
“Switch to dictation mode”
Switch to default mode (command and dictation).“Default mode”
“Switch to default mode”

Interact with apps

To do thisSay this
Open a new app.“Open <app name>”
“Start <app name>”
“Show <app name>”
Close an open app.“Close <app name>”
“Close window”
“Exit <app name>”
“Quit <app name>”
Switch to an existing app.“Switch to <app name>”
“Go to <app name>”
Minimize a window.“Minimize window”
“Minimize <app name>”
Maximize a window.“Maximize window”
“Maximize <app name>”
Restore a window.“Restore window”
“Restore <app name>”
Open task switcher.“Show task switcher”
“List all windows”
“Show all windows”
Go to desktop.“Go to desktop”
“Go home”
“Minimize all windows”
Search on the browser, where “search engine” can be Bing, Google, or YouTube, and “x” is what you’re looking for.“Search on <search engine> for <x>”
Snap window to a specific direction, where “direction” is left, right, top-left, top-right, bottom-left, or bottom-right.“Snap window to <direction>”
“Snap the window to <direction>”
To search for an entity (Entity can be a file or an application) on your windows PC.“Search <Entity>”
“Search Windows for <Entity>”
“Search for <Entity>”

Interact with controls

To do thisSay this
Select an item.“Click <item name>”
“Tap <item name>”
Double-click an item.“Double-click <item name>”
“Mouse double-click”
Put focus on an item.“Move to <item name>”
“Focus on <item name>”
Expand a list.“Expand <item name>”
Toggle between states.“Toggle <item name>”
“Flip <item name>”
Scroll in a specific direction.“Scroll <direction>”
Start scrolling in a specific direction.“Start scrolling <direction>”
Stop scrolling.“Stop scrolling”
“Stop”
Move a slider in a specific direction by a certain distance, where “direction” is up, down, left, or right and “value” is the distance.“Move slider <direction> <value> times”

Apache Log4j

Is Apache Log4j Installed

To determine if Apache Log4j is installed on your system, you can use a combination of manual and automated methods. For Linux servers, you can run a command to search for files related to Log4j:

find / -type f -name log4j*

This command will list all files containing “log4j” in their names, which can help identify if Log4j is installed on your server.8

For Windows servers, you can use a similar approach by searching for files containing “log4j” in their names:

dir C:\*log4j*.jar /s

This command will search for files with “log4j” in their names in the C: drive and its subdirectories.3

Automated tools can also be used to scan for Log4j installations. One such tool is Syft, which can create a software bill of materials (SBOM) and help identify old Log4j versions:

syft dir:/ | grep log4j

This command will scan your server and search for Log4j files.3

Additionally, you can use a Python script or a Go package like log4jscanner to scan your system for vulnerable Log4j versions.43

Since Log4j is a Java library, it may be embedded within other Java applications, making it harder to detect. Therefore, it’s important to check all Java applications running on your system and consult their vendors for any dependencies on Log4j.3

For a more thorough check, you can also manually inspect the manifest files within JAR files to confirm the version of Log4j installed.3

Remember, these methods may not be foolproof, as Log4j can be embedded within other JAR files or applications. Therefore, it’s crucial to follow up with vendor advisories and ensure all applications are updated to the latest versions.

Mass scanning for Log4J in progress.

Remote execution in NSA code Ghidra Log4J.

NSA will release Apache, Log4J, Ghidra.It will burn every computer from the inside

Taking down the whole internet with Ghidra?

Microsoft tools used to hack

Hackers use Microsoft’s tools to slip past antivirus

Hackers use Microsoft's tools to slip past antivirus
Microsoft tools used to hack

Trend Micro has identified Earth Preta, also known as Mustang Panda, as the Chinese hacking group using Microsoft’s Application Virtualization Injector to bypass antivirus defenses by injecting malicious code into legitimate processes. Earth Preta has been focusing most of its attacks on systems in Taiwan, Malaysia and Vietnam.

Full Story: TechRadar Pro (2/20) 

Risk Communication

Cyber Risk Communication Document

Creating a cyber risk communication document involves several steps to ensure that all stakeholders are informed effectively about potential risks and how to mitigate them.

Here’s a structured approach based on the provided context:

  1. Identify the Audience: Determine who the document is for, such as executives, board members, employees, or clients. Tailor the language and level of detail to suit each audience’s needs and understanding.
  2. Gather Information: Collect data on current risks, threat landscapes, and any ongoing or past incidents. Include details on the organization’s cybersecurity posture and any existing controls or measures in place.
  3. Structure the Document: Organize the information logically. Start with an executive summary that highlights key risks and recommendations. Follow with detailed sections on each risk, including its potential impact, likelihood, and proposed mitigation strategies.
  4. Use Clear and Concise Language: Avoid technical jargon that might confuse non-technical stakeholders. Present information in a way that is easy to understand and actionable.
  5. Include Visual Aids: Use graphs, charts, and other visual aids to make complex information more accessible. For example, a proximity resilience graph can help illustrate the organization’s resilience against specific threats and risk impacts.
  6. Provide Context: Explain why each risk is significant and how it could affect the organization. This helps stakeholders understand the urgency and importance of addressing the risks.
  7. Recommend Mitigation Strategies: Offer specific steps that can be taken to reduce the likelihood or impact of identified risks. Include both immediate actions and long-term strategies.
  8. Review and Update Regularly: Cyber threats evolve rapidly, so the document should be reviewed and updated regularly to reflect new risks and changes in the threat landscape.
  9. Communicate Proactively and Reactively: In addition to the document, maintain regular communication channels to keep stakeholders informed about ongoing risks and any new developments. This could include regular updates, incident alerts, and educational content.
  10. Test the Plan: Conduct regular drills and simulations to test the effectiveness of the communication plan and make necessary adjustments.