Networking
NSA Report Details the Extent and Effectiveness of PRC Exploitation of the Internet
Reading Time: 2 min.
The NSA release this week a comprehensive report with explicit details of the extent of the activity and ‘Tradecraft” of…
Vulnerability Opens Millions of Trucks to Remote Takeover
Reading Time: 2 min.
A recent paper published by researched at the University of Colorado is just the latest in a long line of…
How Could This Happen?! A Deep Dive into the Change Healthcare Attack
Reading Time: 11 min.
It’s not an aberration – it WILL happen again As many of you have no doubt heard or read about,…
Alert: Two major flaws expose WiFi networks to attack, affects billions of users
Reading Time: 5 min.
Summary Two major flaws in open-source software could enable bad actors to break into password-protected home and enterprise WiFi networks. The…
Uninterruptible Power Supply (UPS) Devices In the Bullseye for Hackers
Reading Time: 2 min.
Weak Protocols and Built-in Back Doors Make These Inviting Targets The Cybersecurity and Infrastructure Security Agency (CISA) and the Department…
Whistleblower Alleges NSO Group Offered ‘Bags of Cash’ for Access to U.S. Cell Networks
Reading Time: 1 min.
Another Tool for Pegasus Spyware The Washington Post has reported that In 2017, a conference call revealed that the surveillance…
Chinese malware threatens US military and infrastructure
Reading Time: 1 min.
Implanted Code Waiting to be Activated in Conflict The New York Times reports that American intelligence security experts have raised…
Android TV Streaming Boxes Riddled with Backdoor Malware
Reading Time: 1 min.
Well, this one certainly wins the prize this week! Wired Magazine published a round-up of multiple cybersecurity researchers and the…