hacking

127 Articles 0 Followers


The Colonial Pipeline Cyberattack Might be Good for America

17 May 2021 1 minute read 0 comments Matthew Rosenquist

The Colonial Pipeline ransomware attack, that caused fear of fuel shortages on the US East Coast, might be exactly what the nation needed to improve Critical Infrastructure security! In this week’s video, I discuss why the attack was a much-needed w...

Intel in Denial of the Latest SGX Secure Enclave Vulnerability

19 Nov 2020 1 minute read 8 comments Matthew Rosenquist

Another vulnerability and exploit named VoltPillager has been published for Intel Corporation's SGX security technology.  The attack itself is simply a hardware version of a previously discovered PlunderVolt software vulnerability where voltage to t...

Ransomware Explained Video Series

9 Jun 2021 1 minute read 2 comments Matthew Rosenquist

Ransomware is a rising threat to every organization, device, and person connected to the Internet.  All the products, services, and critical infrastructures are at risk of being victimized.  We are all being impacted by this type of cybercrime and i...

EC-Council Free Online Event for Cybersecurity Skills Development

13 Sep 2020 1 minute read 0 comments Matthew Rosenquist

EC-Council is announcing the #TheNextBigThingInCyber skills development in a free online event on Sept 16th 9:30am EST.  EC-Council's CEO, Jay Bavisi will discuss what it means to Humanize firewalls, build a new era of ethical hackers, empower cyber...

An overview of Crypto crime in 2020

24 Feb 2021 4 minute read 9 comments fklivestolearn

Although Darknet markets revenue dominated, Ransomware & DeFi hacks were the bigger story that emerged last year 2020was a record-breaking year for cryptocurrencies, led by Bitcoin. Despite the COVID-19 pandemic wreaking havoc on the lives of people,...

Intel Designs Chips to Protect from ROP Attacks

16 Jun 2020 1 minute read 3 comments Matthew Rosenquist

Intel comes late to the game but will be delivering an embedded defense for Return Oriented Programming (ROP) types of cyber hacks. I first blogged about this back in Sept of 2016. Yes, almost four years have passed and I had hoped it would see the...

Ransomware Explained - Understanding the Attackers

23 Jun 2021 1 minute read 1 comment Matthew Rosenquist

Understanding the attackers is the first step in identifying an effective, efficient, and sustainable paths to mitigating the risks of ransomware. The root cause of ransomware resides with the people behind the attacks.  Recognizing threat agent’s...

Wi-Fi has had a vulnerability ever since it's inception

13 May 2021 1 minute read 0 comments Lukros76

A security researcher that has been researching Wi-fi and discovered many previously unknown flaws within the system, Mathy Vanhoef, recently discovered a new group of vulnerabilities he's named "FragAttacks". The vulnerabilities are mostly connected...

Top 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks!

11 May 2021 1 minute read 0 comments Matthew Rosenquist

The SolarWinds and Exchange supply-chain attacks have highlighted how vulnerable 3rd party and vendor security is for every organization.   The industry must fundamentally change to manage the growing risks and it will take time.  There are some ste...

Be Careful of Unmasking & Dusting Attacks

18 Apr 2021 3 minute read 1 comment Suny Ag

Today a bitcoin is worth $60K and even the smallest part of it, the Satoshi, is considered valuable. If you combined the price of some Satoshi, that also becomes large enough. The same goes for Ehereum which is even more vulnerable to such attacks. ...