top of page
Search


Supply-Chain Ransomware Takes Down Takes Down Over 60 Credit Unions
Ransomware operators took down 60 credit unions across the US after hacking their services provider – a classic supply chain attack....
Rodney
Dec 18, 20232 min read
45
0


Windows Hello Auth Bypassed on Popular Laptops
If you have a Windows laptop, then you probably have come across Windows Hello. It's a biometric login that on supported laptops, allows...
Rodney
Nov 27, 20234 min read
61
0


Mortgage Giant Mr. Cooper Gets Hit by Cyberattack and Suffers Outage
U.S. mortgage lending giant Mr. Cooper was breached in a cyberattack that caused the company to shut down IT systems, including access to...
Rodney
Nov 20, 20232 min read
35
0


Google Play Store Launches ‘Independent Security Review’ Badge for VPN Apps
Google's Play Store has been persistently threatened by malicious and insecure apps over the years, triggering alarm bells among many...
Rodney
Nov 7, 20232 min read
39
0


RagnarLocker Ransomware Seized by Law Enforcement
What is Ragnar Locker? Ragnar Locker (aka Ragnar_Locker and RagnarLocker) is one of the longest-running ransomware operations at this...
Rodney
Oct 30, 20232 min read
39
0


PDF Cracking with Cloud Computing
Introduction Hashcat is a popular password cracker and designed to break even the most complex password representation. To do this, it...
Rodney
Oct 17, 20234 min read
45
0


HTTP Parameter Pollution (HPP)
Introduction HTTP Parameter Pollution (HPP) is a type of injection attack that occurs when a target system accepts multiple parameters...
Rodney
Oct 9, 20234 min read
66
0


Hunting Insecure Direct Object References (IDORs)
Introduction Insecure Direct Object Reference (IDOR) is a type of access control vulnerability that arises when the references to data...
Rodney
Oct 2, 20235 min read
57
0


Caesars Entertainment Hacked, Pays Millions in Ransom to Hackers
Caesars Entertainment, self-described as the largest U.S. casino chain with the most extensive loyalty program in the industry, says it...
Rodney
Sep 25, 20233 min read
26
0


6 Simple Ways To Protect Your Smartphone
Your cell phone holds some of your most sensitive personal information. Things like your passwords and account numbers, emails, text...
Rodney
Sep 19, 20233 min read
31
0


Online Identity Management with Proton Pass
A couple of months ago, Proton — the company behind the end-to-end encrypted email service Proton Mail — officially launched its password...
Rodney
Sep 11, 20234 min read
14
0


Discord.io Suffers Massive Data Breach
Discord.io was/is a third party service that enables owners of Discord servers to create customized, personal Discord invites. As of...
Rodney
Sep 4, 20233 min read
50
0


Widespread LinkedIn Accounts Hijacking Campaign
As reported by the Cyberint research team, there has been widespread hacking attempts on LinkedIn accounts resulting in many accounts...
Rodney
Aug 29, 20233 min read
23
0


Rhysida: The New Ransomware Group
The Rhysida ransomware group was first observed in May 2023, following the emergence of their victim support chat portal hosted via TOR...
Rodney
Aug 21, 20233 min read
57
0


Beware of MasquerAds: The Latest Malware Advertising Campaign via Google Ads
Google is the largest search engine with the most users on the face of the planet. Its ad platform, dubbed Google Ads, is used by...
Rodney
Aug 14, 20233 min read
27
0


Passwords are Broken! All Hail Passkeys??
Passwords Passwords have been around for decades. They are the de-facto authentication standard used across the web for identity...
Rodney
Aug 7, 20236 min read
127
0


Mental Health in Cyber Security
Mental health in the cybersecurity industry is becoming more and more relevant, especially with the rising prevalence of burnout....

David Lee
Jun 29, 20233 min read
48
0


Web Application Pentest/ Bug Bounty Checklist & Methodology
OK, so you want to start pentesting websites or doing bug bounties against web applications, but where do you start? This is the perfect...

David Lee
May 4, 20233 min read
852
0


Power Automate All The Things
If you're working with the Microsoft 365 suite of products, you have no doubt come across or at least heard of "Power Automate" or as it...

David Lee
Apr 17, 20236 min read
201
1


17 Days & Counting..
The countdown has begun for my wife and I, as we get ready to depart Australia. My next chapter in life, as a digital nomad traveling...

David Lee
Apr 6, 20232 min read
48
0
bottom of page