Cameron Camp

Cameron Camp

Security Researcher


Education: CISSP, RHCSA

Highlights of your career? Reverse engineering human brain patterns.

What malware do you hate the most? Nation state sponsored low and slow.

Favorite activities? Building and flying airplanes.

What is your golden rule for cyberspace? Stupid hurts.

When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.

Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.


270 articles by Cameron Camp

Cybercrime

Black Hat 2021: Wanted posters for ransomware slingers

Black Hat 2021: Wanted posters for ransomware slingers

Cybercrime

Black Hat 2021: Wanted posters for ransomware slingers

Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?

Cameron Camp06 Aug 20212 min. read


Digital Security

Black Hat 2021 – non-virtual edition

Black Hat 2021 – non-virtual edition

Digital Security

Black Hat 2021 – non-virtual edition

How is Black Hat USA 2021 different from the past editions of the conference and what are the themes may steal the show this year?

Cameron Camp04 Aug 20212 min. read


Ransomware

Kaseya supply-chain attack: What we know so far

Kaseya supply-chain attack: What we know so far

Ransomware

Kaseya supply-chain attack: What we know so far

As news breaks about the supply-chain ransomware attack against Kaseya's IT management software, here’s what we know so far

Cameron Camp03 Jul 20212 min. read


Ransomware

5 essential things to do before ransomware strikes

5 essential things to do before ransomware strikes

Ransomware

5 essential things to do before ransomware strikes

By failing to prepare you are preparing to fail – here’s what you can do today to minimize the impact of a potential ransomware attack in the future

Cameron Camp18 Jun 20213 min. read


Less Technical

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Less Technical

Tracking ransomware cryptocurrency payments: What now for Bitcoin?

Should we expect cybercriminals to ditch the pseudonymous cryptocurrency for other forms of payment that may be better at throwing law enforcement off the scent?

Cameron Camp11 Jun 20212 min. read


Digital Security

Hacking space: How to pwn a satellite

Hacking space: How to pwn a satellite

Digital Security

Hacking space: How to pwn a satellite

Hacking an orbiting satellite is not light years away – here’s how things can go wrong in outer space

Cameron Camp07 Jun 20215 min. read


Critical Infrastructure

Colonial Pipeline attack: Hacking the physical world

Colonial Pipeline attack: Hacking the physical world

Critical Infrastructure

Colonial Pipeline attack: Hacking the physical world

The attack is a reminder of growing cyberthreats to critical infrastructure while also showing why providers of essential services are ripe targets for cybercriminals

Cameron Camp19 May 20212 min. read


Business Security

Supply-chain attacks: When trust goes wrong, try hope?

Supply-chain attacks: When trust goes wrong, try hope?

Business Security

Supply-chain attacks: When trust goes wrong, try hope?

How can organizations tackle the growing menace of attacks that shake trust in software?

Cameron Camp07 Apr 20216 min. read


Digital Security

When repairing things you own may make you an outlaw

When repairing things you own may make you an outlaw

Digital Security

When repairing things you own may make you an outlaw

How do you balance the right to repair with the requirement to remain secure?

Cameron Camp23 Mar 20215 min. read