Of sharks, surveillance, and spied on emails
This week on Lock and Code, we speak with Matthew Guargilia about the NSA’s broad powers to sweep up Americans’...
Read more →This week on Lock and Code, we speak with Matthew Guargilia about the NSA’s broad powers to sweep up Americans’...
Read more →In this talk, Louis covers 3 web cache related attacks: cache deception, edge side includes, and cache poisoning. Note: this...
Read more →Microsoft denied the data breach after the collective of hacktivists known as Anonymous Sudan claimed to have hacked the company....
Read more →The alleged ringleader of the phone scam gang, which preyed on elderly individuals through fraudulent phone calls, has also been...
Read more →China-linked APT group was spotted using HTML smuggling in attacks aimed at Foreign Affairs ministries and embassies in Europe. A...
Read more →Microsoft has denied the claims of the so-called hacktivists “Anonymous Sudan” that they breached the company’s servers and stole credentials...
Read more →Meduza authors are pushing the malware as a subscription-based service, offering plans for 1-month, 3-month, and lifetime access. Crimeware-as-a-Service (CaaS)...
Read more →[ This article was originally published here ] Whether you work in the tech field or not, it’s likely that...
Read more →Back in March 2023, I noticed an interesting security advisory that was published by Wordfence about a critical “Authentication Bypass...
Read more →A phishing campaign that security researchers named SmugX and attributed to a Chinese threat actor has been targeting embassies and...
Read more →[ This article was originally published here ] The content of this post is solely the responsibility of the author. ...
Read more →According to recent reports, there have been two serious vulnerabilities found in the Trellis SIEM. These vulnerabilities could potentially allow...
Read more →