Fancy Bear & WADA Modifications

Fancy Bear & WADA Modifications

The World Anti-doping Agency (WADA) released details of the data breach that occurred last month to its Anti-Doping Agency Management System (ADAMS) that had been built specifically for the Rio 2016 Olympic Games.  None of the other WADA systems appear to have been affected by the hack.  Most troubling, however, is that WADA found “inconsistencies” […]

FIFA Domain Squatting

Soccer (Football) Fans Being Targeted by Advanced Cyber Threat Actors

FIFA Domain Squatting

The Fédération Internationale de Football Association (FIFA), the sport’s global governing body uses the official domain:  www.fifa.com.  Threat analysts have recently identified several domain squatting efforts using the following registered domains: fifa.com.co fifa-rules.25u.com fifaregionalprojects.org fifa2015fifa.publicvm.com The domain fifa-rules.25u.com has been previously identified as being associated with the Turla Advanced Persistent Threat  reported on by the researchers at […]

November 2015: Stade de France Terror Attack

November 2015: Stade de France Terror Attack

On the night of November 13, 2015, attackers targeted five sites in Paris and the Stade de France.[1] Across all of the locations, 130 people were killed and hundreds were injured.[2] In the attack on the stadium alone, three people were killed. According to a police union official, there were two suicide attacks and one […]

Tennis in the World

Tennis in the World

The Association of Tennis Professionals (ATP) was formed in September 1972 by Donald Dell, Bob Briner, Jack Kramer, and Cliff Drysdale to protect the interests of male professional tennis players. Drysdale became the first President. Since 1990, the association has organized the worldwide tennis tour for men and linked the title of the tour with […]

Protecting Golf: The Game, the Golfers and the Sponsors

Protecting Golf: The Game, the Golfers and the Sponsors

Since 1916 the Professional Golfers’ Association of America (PGA) has been the vanguard for the game.  They offer training, tournaments and prizes.  They also offer a level of collegiality that is unique in the sports world. Because golf is not a team sports; but rather a test of one’s own discipline, spirit and dedication it […]

Baseball Breathing Room

Baseball Breathing Room

With the baseball season winding down, now is the time to focus on those back-office activities that can help protect the athletes, coaches, venues and sponsors.  Team management can now find out about the new opportunities for immunity protection under the Cyber Information Security Act of 2015 (CISA).  To be eligible an entity must be […]

Public Events and Situational Awareness

If you see something, say something.

Public Events and Situational Awareness

Ever since the Boston Marathon bombing on April 15th, 2013 the sports-going public has become more aware of the risks of participating in public sporting events.  The thought of random acts of terrorism is planted in the collective consciousness and it affects all of us. The prospect of a terrorist act at a major sporting […]

Laremy Tunsil Story

Laremy Tunsil Story

One of the best examples of how personal brands can go awry is the Laremy Tunsil story.  His projected salary was $20.4 million going into the 2016 NFL Draft with a estimated signing bonus of $13.1 million. But his Twitter account was hacked 30 minutes before the draft and a photo of a person (alleged […]

Teaming for Protecting the Culture of Sports

The Benefits of Joining

Teaming for Protecting the Culture of Sports

Protecting the teams and their athletes from cybersecurity attacks is one of the key benefits of participating in an Information Sharing and Analysis Organization (ISAO). Adopting a traditional strategy of leveraging sport as an instrument to deliver social change, the Cyber Resilience Institute (CRI) was the primary sponsor of a proof-of-concept (POC) that was delivered […]

US-Cert Releases Guidance on ShadowBrokers Data Dump

US-Cert Releases Guidance on ShadowBrokers Data Dump

The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across an enterprise. […]