Cybersecurity plan

White House eyes overhaul of cybersecurity plan

The Office of the National Cyber Director has begun developing a new strategy to address threats from China and other adversaries. The strategy will involve collaborating with the private sector, focusing on harmonizing regulations and setting minimum cybersecurity standards, said Director Sean Cairncross who has cited the need for a clear message to deter attacks. Full Story: Federal News Network/WFED-AM (Washington, D.C.) (10/31)

This new strategy may eventually be adopted on a Global scale, as we follow the goings on around the World.

Are passkeys vulnerable to browser-based attacks?

Researchers from SquareX said they were able to compromise passkeys through browser #vulnerabilities. The researchers presented their findings at Def Con 33, showing attackers can use #malicious extensions or scripts to intercept passkey workflows, making fraudulent passkey prompts appear legitimate. But security experts have criticized the research, saying it demonstrates a misunderstanding of the FIDO specifications and security principles.

Full Story: TechRadar (8/28)

https://www.techradar.com/pro/security/researchers-reveal-that-passkeys-are-not-as-safe-as-we-think-they-are-heres-how-to-stay-safe

Self preservation in Action

Experts will always deny what is obvious to protect their decisions in this false security playing field.

Threat Detection

Dual Role of AI: Protection and Threat Detection

AI is transforming IT, #cybersecurity, and tech through intelligent threat detection, proactive cloud security, and risk management. It’s a catalyst for innovation and data-driven decisions, but also poses threats. Explore AI’s dual role as protector and threat at our event, and stay competitive in the evolving AI field.
Register now!

The Matrix now Activated.

Disable Excel workbook links 

Microsoft to disable Excel workbook links to blocked file types

Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026.

After the rollout, Excel workbooks referencing blocked file types will display a #BLOCKED error or fail to refresh, eliminating security risks associated with accessing unsupported or high-risk file types, including, but not limited to, phishing attacks that utilize workbooks to redirect targets to malicious payloads.

This change is being introduced as a new FileBlockExternalLinks group policy, which expands File Block Settings to include external workbook links.

Read the full article: Microsoft to disable Excel workbook links to blocked file types

SolarWinds Backdoor

What They’re Not Telling You About SolarWinds: It Wasn’t a Breach — It Was the Backdoor

In December 2020, the world was told a Russian “Hack” hit U.S. federal networks through SolarWinds.

Wrong.

It wasn’t a foreign op.

It was a white hat takeover of the digital command grid.

Let me show you.

1. What Was SolarWinds?

A Texas-based IT company that pushed software updates to:

  • Pentagon
  • DHS
  • State Department
  • Treasury
  • NSA
  • Big Tech (Microsoft, Cisco)
  • Even Dominion Voting Systems
  • The update included a hidden “Sunburst” backdoor.

What they called a vulnerability…

…was actually a legal foothold.

2. EO 13848 Was Already Active

Trump had already signed Executive Order 13848 in 2018:

Declaring election interference a national emergency.

By 2020, SolarWinds gave federal intel teams lawful access to:

  • Servers
  • Email traffic
  • Internal communications
  • Contract records
  • Voting infrastructure

Under 13848, they didn’t need permission.

They needed access.

SolarWinds was access.

3. What Came Next?

  1. 2021: Microsoft, FireEye, and CISA all “confirm breach”
  2. 2021–2022: Mass resignations in Big Tech, banking, and military
  3. 2022–2023: SCOTUS shadow docket rulings + Roe overturned
  4. 2023–2024: NGO purges, media collapses, asset seizures escalate
  5. 2025: One Big Beautiful Bill → AI firewall codified

You’re watching a multi-year digital sting operation unfold in quarters.

4. SolarWinds + EO 13961 = Continuity Killbox

EO 13961 (Mission Continuity Strategy, Dec 2020):

Federalizes critical mission systems across all agencies.

Now link the pieces:

  • SolarWinds → digital access
  • EO 13848 → legal seizure authority
  • EO 13961 → control continuity
  • 2025 AI Clause → shields enforcement from state interference

This isn’t cleanup. It’s activation.

5. The Real Operation

SolarWinds wasn’t a failure.

It was the launchpad for:

  1. Asset tracing
  2. Intel extraction
  3. Sting AI deployment
  4. Legal lockdown of Deep State infrastructure

Total ops handoff to Continuity teams (Guard/Marines/Coast Guard)

The Great Reset isn’t theirs.

It’s ours.

Bottom Line:

  • SolarWinds was the moment they got the keys.
  • Every laptop seized…
  • Every NGO collapsed…
  • Every offshore trust exposed…
  • It all ties back to December 2020.
  • And now in July 2025, they’ve made it permanent.

WhatsApp security

House bans WhatsApp citing security concerns

The House has banned WhatsApp from all devices, citing security concerns regarding data protection and encryption. The Office of Cybersecurity has recommended alternatives such as Microsoft Teams, Amazon Wickr, Signal and Apple iMessage. Meta has disagreed with the ban, asserting that WhatsApp offers superior security.

Full Story: U.S. News & World Report (6/24) 

Offboarding Remote workers

Offboarding remote workers is not as easy as it seems, so here is an article from Forbes for some things to consider when offboarding remote workers

Companies often overlook offboarding of remote employees, leading to data breaches and potential legal issues, writes Brandon Batchelor of ReadyCloud, an ecommerce CRM. Common mistakes include failing to recover equipment, not rescinding software access, poor internal communication and ignoring the emotional aspects of offboarding.

Full Story: Forbes (tiered subscription model) (5/5) 

Considering some of the above issues involved, one really has to wonder if the correct analysis of the risks of remote workers has been done and are worth the initial savings involved.

The question’s are who are they, who and where do they live, who are their partners, what additional software is installed on their devices, what AI features are they using that could compromise your security and credibility.

Many cases of remote worker fraud have been recorded.

Risk Communication

Cyber Risk Communication Document

Creating a cyber risk communication document involves several steps to ensure that all stakeholders are informed effectively about potential risks and how to mitigate them.

Here’s a structured approach based on the provided context:

  1. Identify the Audience: Determine who the document is for, such as executives, board members, employees, or clients. Tailor the language and level of detail to suit each audience’s needs and understanding.
  2. Gather Information: Collect data on current risks, threat landscapes, and any ongoing or past incidents. Include details on the organization’s cybersecurity posture and any existing controls or measures in place.
  3. Structure the Document: Organize the information logically. Start with an executive summary that highlights key risks and recommendations. Follow with detailed sections on each risk, including its potential impact, likelihood, and proposed mitigation strategies.
  4. Use Clear and Concise Language: Avoid technical jargon that might confuse non-technical stakeholders. Present information in a way that is easy to understand and actionable.
  5. Include Visual Aids: Use graphs, charts, and other visual aids to make complex information more accessible. For example, a proximity resilience graph can help illustrate the organization’s resilience against specific threats and risk impacts.
  6. Provide Context: Explain why each risk is significant and how it could affect the organization. This helps stakeholders understand the urgency and importance of addressing the risks.
  7. Recommend Mitigation Strategies: Offer specific steps that can be taken to reduce the likelihood or impact of identified risks. Include both immediate actions and long-term strategies.
  8. Review and Update Regularly: Cyber threats evolve rapidly, so the document should be reviewed and updated regularly to reflect new risks and changes in the threat landscape.
  9. Communicate Proactively and Reactively: In addition to the document, maintain regular communication channels to keep stakeholders informed about ongoing risks and any new developments. This could include regular updates, incident alerts, and educational content.
  10. Test the Plan: Conduct regular drills and simulations to test the effectiveness of the communication plan and make necessary adjustments.

CrowdStrike incident

CrowdStrike incident sparks debate on automatic updates

CrowdStrike’s faulty auto-update patch in July caused operating systems to crash, sparking a debate on the best approach to software updates. While automatic updates are crucial for minimizing cyberthreats, the incident highlighted the risks of operational disruptions. The event has led to calls for better vendor management and more informed decision-making regarding update strategies.

Full Story: Risk (subscription required) (10/1) 

So more cabal software issues are being brought to view!