Interesting Privilege Escalation Vulnerability
August 26 2021If you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software —...
Read moreIf you plug a Razer peripheral (mouse or keyboard, I think) into a Windows 10 or 11 machine, you can use a vulnerability in the Razer Synapse software —...
Read moreIn 2018, Andrew Schober was digitally mugged for approximately $1 million worth of bitcoin. After several years of working with investigators, Schober says he's confident he has located two...
Read more
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used...
Read moreWhen a helpful feature (that you probably didn't need) turns into an exploitable vulnerability...
Read moreThat's funny. I could have sworn I didn't run a print job yesterday... but will you look at that?
Read moreInteresting National Geographic article. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines...
Read moreAnother week, another cryptocurrency catastrophe. This time, it's "only" $100 million's worth...
Read more
In this post, I’ll collect links on Apple’s iPhone backdoor for scanning CSAM images. Previous links are here and here.
Apple says that hash collisions in its...
Read moreCriminal hackers will try almost anything to get inside a profitable enterprise and secure a million-dollar payday from a ransomware infection. Apparently now that includes emailing employees directly and...
Read moreLastest episode - listen, laugh and learn! This week, Chester Wisniewski joins us on the show.
Read more
Recent Comments