Malicious Life Podcast: The Jester - Hacktivist for Good

Malicious Life Podcast: The Jester – Hacktivist for Good

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that ...
Are Decade-Old DoS Tools Still Relevant in 2021?

Are Decade-Old DoS Tools Still Relevant in 2021?

| | ddos, DDoS attacks, DoS, hacks
Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services. The post Are Decade-Old DoS Tools Still ...
Community detection: CVE-2020-16898

Community detection: CVE-2020-16898

By Ben Reardon, Corelight Security Researcher This month’s Microsoft Patch Tuesday included a severe Remote Code Execution vulnerability in the way that Windows TCP/IP handles IPv6 “Router Advertisement” ICMP messages. Due to ...

3 Types of Network Attacks to Watch Out For

Cybersecurity is becoming more of a common tongue term in today’s industry. It is being passed around the executive meetings along with financial information and projected marketing strategies. Here are some common ...
What Is the Low Orbit Ion Cannon (LOIC)?

What Is the Low Orbit Ion Cannon (LOIC)?

The Low Orbit Ion Cannon (LOIC) is a network stress testing application created by Praetox Technologies. It is used as an attack tool in DoS/DDoS attacks. LOIC is a Windows application that ...
Putting an AEG Scale Denial of Service Vulnerability into Action

Your Smart Scale is Leaking More than Your Weight: Privacy Issues in IoT

These days IoT devices are an easy entry point for malicious users to invade users privacy. With that in mind, we tested the AEG Smart Scale PW 5653 BT, specifically the Bluetooth ...
Disaster Recovery: Data Center or Host Infrastructure Reroute

Disaster Recovery: Data Center or Host Infrastructure Reroute

Companies, even large ones, haven’t considered disaster recovery plans outside of their primary cloud providers own infrastructure as regularly as they should. In March of this year, Amazon Web Services (AWS) had ...
Bank of Spain Reveals Its Website Suffered a DoS Attack

Bank of Spain Reveals Its Website Suffered a DoS Attack

The Bank of Spain revealed that bad actors used a denial-of-service (DoS) attack to temporarily disrupt access to its website. On 27 August, a spokesperson for Spain’s central bank disclosed the attack ...
WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

WAFs Should Do A Lot More Against Current Threats Than Covering OWASP Top 10

Looking in the rearview mirror The application threat landscape has rapidly evolved. For years, users consumed applications over the internet using the common tool – web browsers. At every point in time, ...
SIP Protection: What Your SIP Security Solution Should Have

SIP Protection: What Your SIP Security Solution Should Have

SIP-enabled devices have gained widespread use in recent times. With more and more VoIP applications that use SIP as their signalling protocol being developed these days, the industry should put greater emphasis ...