Russia’s offensive cyber actions should be a cause for concern for CISOs
While acknowledging there are “not currently any specific credible threats to the U.S.,” Anne Neuberger, deputy national security advisor for cyber, continued how “we’ve been...
Network Scanning
Regardless of your motivations (attacker or defender), you need to know the ports, hosts and services available within a network. From a defender's point of...
A Vulnerability in Apple Products Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Apple Products, which could allow for arbitrary code execution if a user views a specially crafted web page. iOS...
Ukraine Claims ‘Hybrid Warfare’ Already Underway
Government tries to reassure country amidst Russian disinformation effort Read More
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
DSA-5076 h2database – security update
Security researchers of JFrog Security and Ismail Aydemir discovered two remote code execution vulnerabilities in the H2 Java SQL database engine which can be exploited...
DSA-5077 librecad – security update
Multiple security issues were discovered in LibreCAD, an application for computer aided design (CAD) which could result in denial of service or the execution of...
Wazawaka Goes Waka Waka
In January, KrebsOnSecurity examined clues left behind by “Wazawaka,” the hacker handle chosen by a major ransomware criminal in the Russian-speaking cybercrime scene. Wazawaka has...
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking at IT-S Now 2022 in Vienna on June 2,...
San Francisco 49ers Hit by Ransomware
NFL team confirm cyber-attack one day before Super Bowl Read More