hacking

127 Articles 0 Followers


The Colonial Pipeline Cyberattack Might be Good for America

17 May 2021 1 minute read 0 comments Matthew Rosenquist

The Colonial Pipeline ransomware attack, that caused fear of fuel shortages on the US East Coast, might be exactly what the nation needed to improve Critical Infrastructure security! In this week’s video, I discuss why the attack was a much-needed w...

Wi-Fi has had a vulnerability ever since it's inception

13 May 2021 1 minute read 0 comments Lukros76

A security researcher that has been researching Wi-fi and discovered many previously unknown flaws within the system, Mathy Vanhoef, recently discovered a new group of vulnerabilities he's named "FragAttacks". The vulnerabilities are mostly connected...

Top 10 Things the Industry Can Do Now to Mitigate Digital Supply-Chain Attacks!

11 May 2021 1 minute read 0 comments Matthew Rosenquist

The SolarWinds and Exchange supply-chain attacks have highlighted how vulnerable 3rd party and vendor security is for every organization.   The industry must fundamentally change to manage the growing risks and it will take time.  There are some ste...

Be Careful of Unmasking & Dusting Attacks

18 Apr 2021 3 minute read 1 comment Suny Ag

Today a bitcoin is worth $60K and even the smallest part of it, the Satoshi, is considered valuable. If you combined the price of some Satoshi, that also becomes large enough. The same goes for Ehereum which is even more vulnerable to such attacks. ...

/xmlrpc.php: A MalActor's Stage enabling :SSRF/XSPA/DDOS/Bruteforcing XMLBombs/and more

15 Apr 2021 16 minute read 0 comments ButImNotAShark

J.A.W.z: The Solar Powered Bard & Security Researcher =============================================================================================================================Why XML RPC Needs ToGo; TDLRXMLRPC provides a server-side toolkit to Ma...

Chaining Exploits are Taking Vulnerabilities to a New Level

30 Mar 2021 1 minute read 0 comments Matthew Rosenquist

Cyberattacks are leaping ahead in sophistication and the industry is not prepared. As an example, Google Project Zero team recently detected attackers that exploited a combination of seven previously unknown vulnerabilities (0-days) to hack fully pa...

How hackers Steal your Wi-Fi Passwords with an Evil Twin Attack & How to protect from it.

22 Mar 2021 1 minute read 0 comments RezSat

How hackers Steal your Wi-Fi Passwords with an Evil Twin Attack   The biggest advantage of the Evil Twin technique is that it is a passive attack and doesn’t require any active involvement from the attacker, unlike some more advanced attacks. The at...

Concerns of a New Digital Cold War

15 Mar 2021 1 minute read 0 comments Matthew Rosenquist

Nations may be defining what are acceptable targets for digital attacks against adversaries.  We are likely to see nation sponsored or directed attacks against critical infrastructures that could escalate and cause cascading impacts around the globe...

Cyber Threats Porting Malware to Apple Chips

10 Mar 2021 1 minute read 1 comment Matthew Rosenquist

Cyber threats are adapting their malware to work on new Apple chips that will power their products.  The shift to a multi-architecture design will allow attackers to target the next generation of Apple systems and potentially exploit any discovered...

An overview of Crypto crime in 2020

24 Feb 2021 4 minute read 9 comments fklivestolearn

Although Darknet markets revenue dominated, Ransomware & DeFi hacks were the bigger story that emerged last year 2020was a record-breaking year for cryptocurrencies, led by Bitcoin. Despite the COVID-19 pandemic wreaking havoc on the lives of people,...