Our news
-
‘Scheme Flooding’ Allows Websites to Track Users Across Browsers
A flaw that allows browsers to enumerate applications on a machine threatens cross-browser anonymity in Chrome, Firefox, Microsoft Edge, Safari and even Tor.
-
CISA Publishes Eviction Guidance for Networks Affected by SolarWinds and AD/M365 Compromise
Original release date: May 14, 2021 CISA has released an analysis report, AR21-134A Eviction Guidance for Networks Affected by the SolarWinds and Active Directory/M365 Compromise. The report provides detailed steps for affected organizations to evict the adversary from compromised on-premises and cloud environments. Additionally, CISA has publicly issued Emergency Directive (ED) 21-01 Supplemental Direction Version…
-
How to Get into the Bug-Bounty Biz: The Good, Bad and Ugly
Experts from Intel, GitHub and KnowBe4 weigh in on what you need to succeed at security bug-hunting.
-
WordPress Releases Security Update
Original release date: May 13, 2021 WordPress versions between 3.7 and 5.7.1 are affected by a security vulnerability. An attacker could exploit this vulnerability to take control of an affected system. CISA encourages users and administrators to review the WordPress Security Release and upgrade to WordPress 5.7.2. This product is provided subject to this Notification…
-
Colonial Pipeline Shells Out $5M in Extortion Payout, Report
According to news reports, Colonial Pipeline paid the cybergang known as DarkSide the ransom it demanded in return for a decryption key.
-
Ransomware Going for $4K on the Cyber-Underground
An analysis of three popular forums used by ransomware operators reveals a complex ecosystem with many partnerships.
-
Apple’s ‘Find My’ Network Exploited via Bluetooth
The ‘Send My’ exploit can use Apple’s locator service to collect and send information from nearby devices for later upload to iCloud servers.
-
Reverse Shells
Reverse Shells When discussing reverse shells, we should first cover what a shell is. A shell allows a user to interact with an operating system, the applications on the computer, and every function that is allowed for that user. A remote shell allows a user to perform actions on a device across the network. A remote shell works…
-
Researchers Flag e-Voting Security Flaws
Paper ballots and source-code transparency are recommended to improve election security.
-
‘FragAttacks’: Wi-Fi Bugs Affect Millions of Devices
Wi-Fi devices going back to 1997 are vulnerable to attackers who can steal your data if they’re in range.