Networking

NSA Report Details the Extent and Effectiveness of PRC Exploitation of the Internet

Reading Time: 2 min.

The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of…

Read more

Vulnerability Opens Millions of Trucks to Remote Takeover

Reading Time: 2 min.

A recent paper published by researched at the University of Colorado is just the latest in a long line of…

Read more

How Could This Happen?! A Deep Dive into the Change Healthcare Attack

Reading Time: 11 min.

It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…

Read more

Alert: Two major flaws expose WiFi networks to attack, affects billions of users

Reading Time: 5 min.

Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…

Read more

Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers

Reading Time: 2 min.

Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…

Read more

Whistleblower Alleges NSO Group Offered ‘Bags of Cash’ for Access to U.S. Cell Networks

Reading Time: 1 min.

Another Tool for Pegasus Spyware The Washington Post has reported that In 2017, a conference call revealed that the surveillance…

Read more

Chinese malware threatens US military and infrastructure

Reading Time: 1 min.

Implanted Code Waiting to be Activated in Conflict The New York Times reports that American intelligence security experts have raised…

Read more

Android TV Streaming Boxes Riddled with Backdoor Malware 

Reading Time: 1 min.

Well, this one certainly wins the prize this week! Wired Magazine published a round-up of multiple cybersecurity researchers and the…

Read more