Items tagged with cybersecurity
by
Nathan Ord - Sun, Mar 31, 2024
Over the past few days, the security world has been abuzz with the discovery of a backdoor snuck into a compression utility called xz-utils. While this backdoor was effectively a near miss, getting caught before it became pervasive, it...
Read more...
by
Nathan Ord - Sun, Mar 24, 2024
A team of researchers recently found a side-channel vulnerability in Apple’s custom SoC architecture that does not appear patchable and allows for the theft of encryption keys.
The research team, which hails from six different...
Read more...
by
Nathan Ord - Thu, Mar 21, 2024
Most experts would suggest that humans are the weakest link in cybersecurity, which is evidenced by the pervasiveness of phishing emails and whatnot. However, it’s not just end users that can be a problem. System administrators are human...
Read more...
by
Nathan Ord - Mon, Mar 18, 2024
Over the weekend, the hero shooter game Apex Legends, made by EA and Respawn Entertainment, held a tournament that was reportedly compromised by hackers. Multiple players' systems were breached, and game cheats such as X-ray vision and aimbots were installed. How exactly this happened is...
Read more...
by
Nathan Ord - Fri, Mar 15, 2024
StopCrypt ransomware is one of the most prolific yet underreported ransomware families due to its usual target of individuals rather than high-profile businesses or larger entities. We may not see this strain of ransomware in the United...
Read more...
by
Nathan Ord - Thu, Mar 14, 2024
This week, researchers have reported that earlier this year, threat actors leveraged a vulnerability in Windows to deploy DarkGate malware after phishing the victim for initial access. The vulnerability tracked as CVE-2024-21412 led to...
Read more...
by
Nathan Ord - Wed, Mar 13, 2024
Over the past few months, the infamous ransomware group LockBit has faced significant turmoil, including threatening a forum administrator with murder. All while this was happening, members of the group like Mikhail Vasiliev were sitting...
Read more...
by
Nathan Ord - Tue, Mar 12, 2024
Account credentials and personal data are hot commodities online, which often going up for sale at low prices so shady characters can move thousands of accounts quickly. This is reportedly what has happened to just over 15,000 Roku...
Read more...
by
Nathan Ord - Fri, Mar 08, 2024
Researchers have shown that running a man-in-the-middle attack against a Tesla owner can potentially compromise their account, unlock their car, and ultimately allow threat actors to drive away with it. There are, of coruse, a number a caveats. Much of this hinges on some social engineering...
Read more...
by
Nathan Ord - Thu, Mar 07, 2024
The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) is the primary interface between the public and the U.S. government, to report cybercrime and collect information about cybersecurity threats. The IC3 recently...
Read more...
by
Nathan Ord - Wed, Mar 06, 2024
Following yesterday's report on an Air National Guard member sharing classified documents around the Internet, it seems the U.S. Government cannot catch a break. A 63-year-old civilian member of the U.S. Air Force assigned to U.S...
Read more...
by
Nathan Ord - Tue, Mar 05, 2024
Early in 2023, a Department of Defense leaker was nabbed after a year of posting sensitive documents to a Minecraft Discord server. Those documents made their way to sites like 4chan and elsewhere on the internet, and included a plethora...
Read more...
by
Nathan Ord - Mon, Mar 04, 2024
The criminal underbelly of cybersecurity is a shady place, with threat actors thieving data and information wherever possible. On the seemingly competent side of the business, some folks also wish to make a quick buck off the latest hype...
Read more...
by
Nathan Ord - Mon, Mar 04, 2024
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs...
Read more...
by
Nathan Ord - Fri, Mar 01, 2024
There has been a smorgasbord of breaches as of late, though the U.S. government, in conjunction with international partners, is starting to quell that problem. However, in the past year, threat actors have had their pick of the buffet for...
Read more...
by
Nathan Ord - Thu, Feb 29, 2024
Cybersecurity is an incredibly complex and vast topic, requiring a multifaceted approach across multiple sectors and disciplines, so the White House wants you to stop using C and C++. While that is a bit of an unnuanced simplification...
Read more...
by
Nathan Ord - Wed, Feb 28, 2024
When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim...
Read more...
by
Nathan Ord - Sun, Feb 25, 2024
When you think of prison, you probably do not think of technology, and in fact, you may think of the lack thereof. However, a plethora of correctional facilities and inmates utilize technology, and not just that which is smuggled in. Laptops are great for educational, leisure, and other...
Read more...
by
Nathan Ord - Fri, Feb 23, 2024
Virtually all smartphone users around the globe charge their devices daily, either via a wired charger or wireless charging pad. It turn out, however, that wireless chargers can be used to do some pretty nefarious things. Researchers have...
Read more...
by
Nathan Ord - Wed, Feb 21, 2024
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when...
Read more...
by
Nathan Ord - Tue, Feb 20, 2024
We already know that your sensitive information, such as passwords, can be nabbed by listening to your keystrokes, which was proven back in August 2023 by a team of British researchers. However, that is not the only information that can be...
Read more...
by
Nathan Ord - Mon, Feb 19, 2024
Though you may think your home network is secure, attackers may be able to sneak in through your web browser and leverage vulnerabilities to pivot to internal devices. This is especially true for Internet of Things (IoT) equipment, which...
Read more...