hacking

198 Articles 0 Followers


Introduction to MCU's: Introduction to the ESP-32 by Espressif™

12 hours ago 4 minute read 0 comments 5h4d3

What is a Microcontroller (MCU)? Let’s cut through the noise. A microcontroller (MCU) is a small computer — a single chip that contains a processor (CPU), some memory (RAM and Flash), and input/output (I/O) pins you can use to connect to the real wor...

Hacking the Hardware Brains of Computers is the Ultimate Cyberattack

14 May 2025 2 minute read 0 comments Matthew Rosenquist

Compromising the hardware layer, especially the CPU, is the Holy Grail of cyberattacks. Recent work by Christiaan Beek, a leading cybersecurity researcher at Rapid7, into developing a ransomware proof-of-concept that infects at the hardware layer, i...

Cyberwarfare Funding Accelerates and Everyone is at Risk

6 May 2025 1 minute read 0 comments Matthew Rosenquist

Nations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In 2025, the D...

And hacking again! This time, the KiloEX crypto exchange suffered.

16 Apr 2025 1 minute read 1 comment Evtuoil

The exchange was hacked on the evening of April 14th! The attacker withdrew $7 million in cryptocurrencies from the decentralized platform using the "oracle attack". KiloEx, a decentralized perpetual futures exchange, offered the hacker who hacked it...

Are They Vulnerabilities or Undocumented Debug Features

11 Mar 2025 1 minute read 2 comments Matthew Rosenquist

The recent undocumented code in the ESP32 microchip, made by Chinese manufacturer Espressif Systems, is used in over 1 billion devices and could represent a cybersecurity risk. Its reveal by security researchers has kicked off an interesting discuss...

How to Install Termux Using F-Droid: A Complete Guide

2 Mar 2025 3 minute read 3 comments 5h4d3

IntroductionIn a world where mobile devices are more powerful than ever, the ability to harness a full Linux environment on your phone is a game-changer. Whether you're a developer, system administrator, penetration tester, or just someone who loves...

Cybersecurity Perspectives for 2025 – Rinki Sethi

17 Feb 2025 1 minute read 0 comments Matthew Rosenquist

The Cybersecurity Vault — episode 44, with guest Rinki Sethi. 2025 will be an interesting year for the cybersecurity industry! Cybersecurity Insights interviews experts for their take on the most relevant changes. Rinki Sethi discusses how attackers...

Historical Hacks: Operation Aurora

8 Feb 2025 5 minute read 0 comments Investigator515

In previous articles, we’ve made the point that in the early days, a lot of notable cybersecurity events weren’t exactly what we’d call malicious. While they’d certainly be damaging in terms of lost productivity or downtime, often these attacks were...

Historical Hacks: On The Run With Kevin

24 Jan 2025 5 minute read 0 comments Investigator515

Kevin Mitnick achieved notoriety for his offensive hacking techniques. When you look at the early pioneers of cyber and information security, there’s no denying that there have been some controversial yet influential people in the field who helped es...

Fraudsters Abuse DocuSign API for Legit-Looking Invoices

12 Nov 2024 1 minute read 0 comments Matthew Rosenquist

I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to understand if they could be misused by malicious fraudsters. There is not a technical vulnerability, it comes down to a design weak...