PuTTY, the innocuous and ubiquitous terminal application that Windows users download regularly to connect to *nix systems, has been making headlines in the last month after an uptick in malicious activity set off red flags for researchers. As multi...
Researchers at FortiGuard Labs recently discovered a cross-site scripting vulnerability in Cacti, a powerful web-based tool for collecting and graphing time series data. Cacti is frequently used for monitoring and presenting a variety of metrics in I...
Although initially targeted at consumers, so-called “ransomware” has continued to make headlines as cybercriminals began shifting their attention to vulnerable businesses. The malware works by encrypting files on users’ computers an...
La Nuit du Hack is a major French hacking event I attended last Saturday in Paris. The organization is amazing and there is a ton to do there (provided you've had enough sleep in the last few days): bug bounties, wargame, hack4kids and talks of c...
I just finished watching the first episode of Mr. Robot, the new show on USA Network about “a cyber-security engineer by day and vigilante hacker by night...recruited by a mysterious underground group to destroy the firm he's paid to protec...
It was my first time at Hack in Paris, with a single track of talks, but definetely good ones. I'll be highlighting below what struck me the most.
You don't hear me but your phones voice interface does (José Lopes Esteves, Chaouki Kas...
It’s difficult to overemphasize just how vulnerable many healthcare organizations are to cyber attacks. The healthcare industry as a whole simply hasn’t adopted the sorts of protections, best practices, and security awareness as other mar...
At around 5AM PST today, our automatic website scanning system began to detect malicious contents being served from a top 10 global website. This lasted to around 8:30AM PST when, presumably, the website's operators disabled the malicious content...
We don't see many awards for "The Most Influential Men In Silicon Valley" or "Top Men In the Channel". There's a reason for this, of course. The tech sector is dominated by men, from engineering to the C-suite. Security is...
One of the most frightening lessons IT people quickly learn is that large complex systems—software, hardware and certainly operating systems—always do things that no one knew they could do (or expect them to do). That's because these...
Security has typically fallen under the purview of IT, but it’s time to elevate it to a C-suite level discussion. Seemingly every time we turn around there’s something in the news or on social media about high-profile companies like Targe...
While some of everyone's social media presence is inevitably publicly viewable, there are parts that we only want shared/visible to "friends" or other confirmed connections. Facebook, which is already using security tools like HTTPS wit...
PCRE, or Perl Compatible Regular Expressions, is a library of functions that implements regular expression pattern matching. It is used widely in applications ranging from MariaDB to Apache. It is also used extensively by PHP which underpins many web...
Vawtrak, also known as Neverquest, is a banking trojan that is capable of bypassing 2FA (two factor authentication) on some financial institutions. It is also one of your typical information stealer. One of the main strengths of Vawtrak is its use of...