Latest episode - listen now! (And learn about the Navajo Nation's selfless cryptographic contribution to America.)
Read moreWhere have all the cryptocoins gone? Will we ever get them back?
Read moreCobalt Strike Vulnerability Affects Botnet Servers
August 11 2021
Cobalt Strike is a security tool, used by penetration testers to simulate network attackers. But it’s also used by attackers — from criminals to governments — to automate their...
Read moreMicrosoft Patch Tuesday, August 2021 Edition
August 10 2021Microsoft today released software updates to plug at least 44 security vulnerabilities in its Windows operating systems and related products. The software giant warned that attackers already are pouncing...
Read morePractical advice for homes and small businesses, following news that a recently disclosed router bug is actively being exploited by crooks.
Read moreUNC215: Spotlight on a Chinese Espionage Campaign in Israel
August 10 2021This blog post details the post-compromise tradecraft and operational tactics, techniques, and procedures (TTPs) of a Chinese espionage group we track as UNC215. While UNC215’s targets are...
Read moreUNC215: Spotlight on a Chinese Espionage Campaign in Israel
August 10 2021This blog post details the post-compromise tradecraft and operational tactics, techniques, and procedures (TTPs) of a Chinese espionage group we track as UNC215. While UNC215’s targets are...
Read moreApple Adds a Backdoor to iMessage and iCloud Storage
August 10 2021
Apple’s announcement that it’s going to start scanning photos for child abuse material is a big deal. (Here are five news stories.) I...
Read morePhishing Sites Targeting Scammers and Thieves
August 9 2021I was preparing to knock off work on a recent Friday evening when a curious and annoying email came in via the contact form on this site: “Hello I go...
Read moreDefeating Microsoft’s Trusted Platform Module
August 9 2021
This is a really interesting story explaining how to defeat Microsoft’s TPM in 30 minutes — without having to solder anything to the motherboard.
Researchers at the security consultancy...
Read more
Recent Comments