Advertisement · 728 × 90

Posts by Daniel W Woods

For the table, I followed the classifications/categories used by the reports.

Fwiw, if the exploit steals config details/usernames/passwords, then enabling MFA or not exposing the admin panel could still prevent the attack. So in a sense, configuration would still matter. It is murky tho.

1 year ago 2 0 0 0
Calibrating Secure by Design with the Risks Faced by Small Businesses Empirical evidence suggests guiding small businesses toward more secure configurations is more important than eliminating vulnerabilities. 

Based on this evidence, we argued that to calibrate Secure by Design with small business risk, there should be more focus on reducing misconfigurations.

www.lawfaremedia.org/article/cali...

1 year ago 0 0 1 0

- The median estimate of stolen credentials was 29% and phishing 17%.
- Vulnerabilities represented a lower share of initial access vectors in samples comprising smaller firms.
- Exposed vulnerabilities/End of Life software represent a minority of notifications sent by Coalition.

1 year ago 1 0 1 0

We looked at two main data sources: the causes of cyber incidents via DFIR investigations, and the presence of security issues found via scans. We found:
- Exploits of vulnerabilities were the initial access vectors in <50% of incidents across 7 studies, with 32% being the median estimate

1 year ago 0 0 1 0

This project asks whether addressing software vulnerabilities or misconfiguration should be higher priority when pursuing Secure by Design.

Here, vulnerabilities are flaws introduced by the vendor, in contrast to configuration which is controlled by the end-user.

1 year ago 4 1 1 1
WEIS 2025 – The 24th Workshop on the Economics of Information Security (Tokyo, Japan)

Workshop on the Economics of Information Security (WEIS'25) venue and dates just announced.

Date: June 23-25, 2025
Venue: Institute of Industrial Science (IIS), The University of Tokyo
kmlabcw.iis.u-tokyo.ac.jp/weis/2025/in...

1 year ago 1 1 0 0
Preview
[Keynote @ RAID'24] How to solve cybersecurity once and for all [Keynote @ RAID'24] How to solve cybersecurity once and for all - Download as a PDF or view online for free

www.slideshare.net/slideshow/ke...

1 year ago 12 1 2 0
Advertisement
Post image

Definitely a blind men and an elephant problem

1 year ago 1 0 0 0

Interesting slides tho. Will there be a recording?

1 year ago 0 0 1 0

humble title 😂

1 year ago 0 0 1 0

One attack could hit three if the attacker phished credentials and used them to login via RDP

1 year ago 1 0 1 0

Ah it could be. I'll double check. It's why I like sharing figures before publication

1 year ago 0 0 0 0
Post image

Initial access vectors according to various DFIR firms.

Random thoughts:
- None of the reports find the majority are caused by vulns/exploits
- How do some of these firms *not* have an "unknown" category
- Many categories are overlapping
- We really need a standardized schema @zakird.com

1 year ago 7 2 3 0
Preview
Security Economics Join the conversation

I've started building a starter pack for security economics researchers. It's a work in progress, so feedback and suggestions are more than welcome! We'll continue to update it—stay tuned!
go.bsky.app/BgGNPep

1 year ago 9 2 1 0

Strong agree! The threat against consumers is often unrelated to a security breach, typically rooted in defamation, often groundless.

1 year ago 1 0 0 0
Advertisement

Ofc! You're the most curious person in cyber risk

1 year ago 1 0 1 0
Post image

fun fact from SEC Chairman Gary Gensler's resignation announcement

18% of tips/complaints that come to the SEC relate to crypto, even though the crypto market is less than 1% of all financial markets

www.sec.gov/newsroom/pre...

1 year ago 577 192 9 10

Just 1.6% of respondents have cyber coverage, and 8.5% are aware of the product.

It'll be interesting to see how this product evolves.

I think these losses will be absorbed into home insurance policies as a premium option. It's hard to justify a separate sales channel for a <$50 product.

1 year ago 0 0 0 0
Post image

Notably, insurers see non-trivial costs associated with cyberbullying.

The typical claim may involve legal costs, counselling and lost wages to respond to the incident.

But in extreme cases, cyber insurance will cover costs associated with moving home or school.

1 year ago 1 0 1 0
Post image

We also asked participants to estimate how much compensation they would need to cover each cyber incident.

Financial frauds were estimated to be the most expensive, with no statistically significant difference between victims and nn-victims.

The median cost of cyberbullying was estimated to be $0.

1 year ago 0 0 1 0
Post image

Cyber attack and online fraud are possibly too generic.

There was multiple examples where participants thought they were "very easy" to define, only to find the real definitions from a policy are "not at all similar" when presented with one.

These discrepancies can lead to nasty surprises.

1 year ago 0 0 1 0
Post image

The second stage designed a survey to explore coverage, risk and product uncertainty.

Some of these coverages are well understood by both high and low security awareness participants, such as cyberbullying and ID theft.

Cyber extortion was perceived to be the hardest to define.

1 year ago 1 0 1 0
Figure showing cyber insurance covers a range of harms covering security, privacy, scams and online abuse.

Figure showing cyber insurance covers a range of harms covering security, privacy, scams and online abuse.

What does personal cyber insurance cover?

Our new article found that personal cyber insurance covers a range of online harms, including social media abuse.

"Why would money protect me from cyber bullying?": A Mixed-Methods Study of Personal Cyber Insurance
www.computer.org/csdl/proceed...

1 year ago 6 2 1 1
Advertisement
Preview
Study club, labor union or start-up? Characterizing teams and collaboration in the bug bounty ecosystem

Open access version: www.research.ed.ac.uk/en/publicati...

1 year ago 1 0 0 0
Post image

My favourite finding is that these teams function like labour unions in negotiating with large tech companies to receive fair bug bounty payouts. This fighting for the little guy was very Ross.

We scraped a bunch of descriptive stats on team size, finding that the biggest teams have 500+ members.

1 year ago 1 0 1 0
CSDL | IEEE Computer Society

Very proud of Lawrence (Yangheran) Piao who had his first article accepted at Oakland'25.

The paper looks at the role of hacker teams in the Chinese bug bounty ecosystem.

We very sadly lost Ross Anderson mid way through this project.
www.computer.org/csdl/proceed...

1 year ago 6 2 1 0
Preview
MR Podcast: Insurance! - Marginal REVOLUTION In our new Marginal Revolution Podcast Tyler and I talk insurance, the history of insurance, the economics of insurance, the prospects for new types of insurance and more. Did you know that life insur...

I enjoyed Tyler Cowen and Alex Tabarrok on insurance, especially reflections on where the good insurance scholarship is.

No surprise that the sociologists were more insightful than the economists.
marginalrevolution.com/marginalrevo...

1 year ago 2 0 0 0
Preview
How the British Library cyberattack disrupted research Academics who rely on the British Library’s unmatched collection are still feeling the impact of a devastating cyberattack a year ago. Jack Grove hears from those affected and considers how another ca...

Most people outside of research are still unaware of how much the cyberattack on @britishlibrary.bsky.social is still affecting the research community one year on. Good piece covering that + need to invest in libraries
www.timeshighereducation.com/depth/how-br... @timeshighered.bsky.social

1 year ago 206 109 4 10

She'd already reported to Google but hadn't heard back.

1 year ago 1 0 0 0

I recommended this to a colleague who was being impersonated via a gmail account just last week.

1 year ago 1 0 1 0
Advertisement