I Tricked 2 Scammers Into Wasting 16 Hours - Ep. 1

Are Technical Support Scams Getting More Advanced?

| | csu, Phishing, security, tech support scams
Technical support scams (TSS) are responsible for a growing amount of financial losses year after year. Nevertheless, while the victims are losing more money than ever, the number of interactions between criminals and victims is decreasing. Why? Because the scammers are getting better at what they do. In this paper, ... Read More

Five Eyes Cyber Security Predictions

| | csu, governance, security
What cyber threats the future brings to us? An analysis of the cybersecurity strategies of Canada, New Zealand, the UK, the US, and Australia. The post Five Eyes Cyber Security Predictions appeared first on Rainbow and Unicorn ... Read More
Analyzing the Samsung Hack - Thousands of credentials / secrets exposed

Removing Secrets From Your Source Code

| | Breach, Coding, security
This article explains how to keep your software repositories free of passwords, tokens, and private keys. The post Removing Secrets From Your Source Code appeared first on Rainbow and Unicorn ... Read More
Ukraine Power Grid Cyberattacks

Ukraine Power Grid Cyberattacks

| | csu, security
How the Sandworm hacking team tried to disrupt power supply in Ukraine. An analysis of the three attacks in cyberspace. The post Ukraine Power Grid Cyberattacks appeared first on Rainbow and Unicorn ... Read More
Cyberwar and Cyberterrorism: What is the Difference?

Cyberwar and Cyberterrorism: What is the Difference?

| | csu, security, technology
Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely accepted definition of these terms and draw a clear line between the two types of ... Read More

Dark Web Marketplace Vendor Forensics

| | csu, forensics, Privacy
Researchers claim that the majority of the dark web exist to facilitate criminal activities, including drug trade, financial fraud, and illegal pornography. This article explores the different methods researchers have experimented with to help the identification and deanonimisation of the marketplace vendors of the dark web. Dark web marketplaces like ... Read More
Upgrading the TL-WR902AC Travel Router with OpenWrt

Upgrading the TL-WR902AC Travel Router with OpenWrt

| | technology
I had an ageing TP-Link AC750 (TL-WR902AC) pocket router that I used to carry around on my travels before the pandemic. It is a handy travel mate allowing me to share the hotel Wi-Fi with my laptop, tablet and Chromecast devices. Sadly, the router has its limitations, but OpenWrt gave ... Read More
Automate Your Home Lab on the Oracle Cloud

Automate Your Home Lab on the Oracle Cloud

| | api, Coding, DEVOPS, Oracle
Deploy your home lab and max out the free tier on the Oracle Cloud with the Terraform automation tool. Oracle Cloud Infrastructure (OCI) is a public cloud platform offering a generous amount of cloud resources for free. The free tier comes with a maximum of six VMs, 200 GB block ... Read More
Taking Forensic Disk Images from the OVH Cloud

Taking Forensic Disk Images from the OVH Cloud

| | Breach, csu, DFIR, forensics
This article explains how a disk image can be taken from a virtual machine running on the public cloud. The acquired disk image can then be used with offline forensic tools like Autopsy and Encase. When to acquire a forensic image Cybercriminals often abuse services in the public cloud because ... Read More
Wireless (in)security in Canberra CBD

Wireless (in)security in Canberra CBD

| | Raspberry Pi, security, wifi
Due to the strict COVID-19 policies in Australia, the BSides Canberra hacker conference was back in mid-April 2021. My visit was a good excuse to take my pwnagotchi for a walk in Canberra, and draw some conclusions of the Wi-Fi security practices of the Australian capital city. For those not ... Read More