Lindsey O’Donnell Welch

Writer of all things cybersecurity

Decipher
Decipher.sc
Lindsey O’Donnell Welch boosted:
2025-09-05

Hoe. Lee. Shit. @Deciphersec is back! A new podcast just dropped, surprising me when I saw it, about halfway through it and thought I’d post something about it. Congrats to @dennisf and @LindseyODWelch welcome back home!

Lindsey O’Donnell Welch boosted:
2024-08-12

Me and @LindseyODWelch tried to make sense of a long, hot week in Vegas at Black Hat in our latest @Deciphersec podcast.

youtu.be/eziktGJ8PZY?si=IBYLqG

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2024-04-10

Testing testing. Is this place still a thing? 👋🏽

Lindsey O’Donnell Welch boosted:
2024-04-10
Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-22

“Without developers managing the Boa web server, its known vulnerabilities could allow attackers to silently gain access to networks by collecting information from files."

Discontinued Web Server Poses IoT Security Risks

duo.com/decipher/discontinued-

Lindsey O’Donnell Welch boosted:
Lindsey O’Donnell Welch boosted:

For any Apple News users, you can find our channel here: apple.news/T5UJ8OZJ8RgmuGlAVP9

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-22

Updated CISA Infrastructure Resilience Planning Framework includes new tool for identifying critical infrastructure and other resources.

cisa.gov/news/2022/11/22/cisa-

Lindsey O’Donnell Welch boosted:
2022-11-22
Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-22

"If the acquired company has poor security, it could be an easy jumping off point to the parent company for much more valuable information.”

Visibility is key for #security in M&A - However, deals are often fast-moving, making due diligence difficult

duo.com/decipher/complex-m-and

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-21

"It's a big shift in the way you build systems and you know there's no perfect answer here. The best you can really do is have multiple people look at something in those situations because at the end of the day you are trusting people."

duo.com/decipher/q-and-a-dan-l

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-21

A threat actor targeted the legal/retail sectors in callback phishing attacks that cost victims thousands:

-Callback phishing attack requires significant investment, including setting up fake call centers/ unique infrastructure
-But the lack of malware in the original phishing email/ the abuse of legitimate tools make the attack harder to detect

“By design, this style of social engineering attack leaves very few artifacts because of the use of legit trusted tech tools to carry out attacks."

duo.com/decipher/threat-actors

Lindsey O’Donnell Welch boosted:

Hive Ransomware Attacks Target FortiOS, Microsoft Exchange Flaws decipher.sc/hive-ransomware-at

Lindsey O’Donnell Welch boosted:
PwnallthethingsPwnallthethings
2022-11-21
Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-18

The Hive #ransomware has victimized 1,300 companies globally as of November, in particular targeting #healthcare sector organizations, according to U.S. federal agencies in a new advisory.
duo.com/decipher/hive-ransomwa

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-18

@howelloneill "risks of being used improperly" seems key

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-17

Security weaknesses in BIG-IP products have previously been targeted by threat groups in attacks. However, researchers with Rapid7, who discovered the flaws, said that they believe widespread exploitation of the issues “is unlikely.”

duo.com/decipher/code-executio

Lindsey O’Donnell WelchLindseyODWelch@infosec.exchange
2022-11-17

The biggest changes to the LodaRAT malware:
-A function that automatically copies the RAT’s files onto every mounted removable storage device - a capability that required non-automated, individual commands in previous versions of the malware
-A string encoding algorithm that aims to improve the speed of decoding strings and make execution quicker overall
-The cutting out of several “dead” - or non-functional - commands from the components of the malware’s code
duo.com/decipher/lodarat-malwa

Lindsey O’Donnell Welch boosted:

New podcast with Chainguard's Dan Loren is up!

Decipher Podcast: Dan Lorenc decipher.sc/decipher-podcast-d #decipher #deciphersec

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst