hacking

125 Articles 0 Followers


Top 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks!

11 May 2021 1 minute read 0 comments Matthew Rosenquist

The SolarWinds and Exchange supply-chain attacks have highlighted how vulnerable 3rd party and vendor security is for every organization.   The industry must fundamentally change to manage the growing risks and it will take time.  There are some ste...

Be Careful of Unmasking & Dusting Attacks

18 Apr 2021 3 minute read 1 comment Suny Ag

Today a bitcoin is worth $60K and even the smallest part of it, the Satoshi, is considered valuable. If you combined the price of some Satoshi, that also becomes large enough. The same goes for Ehereum which is even more vulnerable to such attacks. ...

/xmlrpc.php: A MalActor's Stage enabling :SSRF/XSPA/DDOS/Bruteforcing XMLBombs/and more

15 Apr 2021 16 minute read 0 comments ButImNotAShark

J.A.W.z: The Solar Powered Bard & Security Researcher =============================================================================================================================Why XML RPC Needs ToGo; TDLRXMLRPC provides a server-side toolkit to Ma...

Chaining Exploits are Taking Vulnerabilities to a New Level

30 Mar 2021 1 minute read 0 comments Matthew Rosenquist

Cyberattacks are leaping ahead in sophistication and the industry is not prepared. As an example, Google Project Zero team recently detected attackers that exploited a combination of seven previously unknown vulnerabilities (0-days) to hack fully pa...

How hackers Steal your Wi-Fi Passwords with an Evil Twin Attack & How to protect from it.

22 Mar 2021 1 minute read 0 comments RezSat

How hackers Steal your Wi-Fi Passwords with an Evil Twin Attack   The biggest advantage of the Evil Twin technique is that it is a passive attack and doesn’t require any active involvement from the attacker, unlike some more advanced attacks. The at...

Concerns of a New Digital Cold War

15 Mar 2021 1 minute read 0 comments Matthew Rosenquist

Nations may be defining what are acceptable targets for digital attacks against adversaries.  We are likely to see nation sponsored or directed attacks against critical infrastructures that could escalate and cause cascading impacts around the globe...

Cyber Threats Porting Malware to Apple Chips

10 Mar 2021 1 minute read 1 comment Matthew Rosenquist

Cyber threats are adapting their malware to work on new Apple chips that will power their products.  The shift to a multi-architecture design will allow attackers to target the next generation of Apple systems and potentially exploit any discovered...

An overview of Crypto crime in 2020

24 Feb 2021 4 minute read 9 comments fklivestolearn

Although Darknet markets revenue dominated, Ransomware & DeFi hacks were the bigger story that emerged last year 2020was a record-breaking year for cryptocurrencies, led by Bitcoin. Despite the COVID-19 pandemic wreaking havoc on the lives of people,...

HMG CISO Executive Leadership Summit

20 Feb 2021 1 minute read 1 comment Matthew Rosenquist

I am looking forward to speaking at the upcoming HMGLive CISO executive leadership event! I encourage all cybersecurity leaders to attend and interact. This is how we build teamwork, communicate challenges, and share best practices.   Registration i...

Unbelievable but true !!!

13 Feb 2021 1 minute read 14 comments MikeZillo

The Bitcoin blockchain is the "oldest" in the digital landscape, and therefore we can also consider it the most tested and solid; but… Well, something technically impossible has been recorded: a double expense! Here we are: It sounds surreal, but it...