vendors Remedy for 'Dying' Software Development Team

Are Vendors Failing in the Face of Open Source Cyberthreats?

Software vendors must understand the implications a breach in open source software might have on their own product or service. In December 2021, for example, a vulnerability was discovered in Log4j, an ...
Security Boulevard

What is DNS Spoofing?

| | Hack, spoofing
Domain Name Server (DNS) spoofing is a type of attack in which the DNS records are altered to redirect the online traffic to a spoofed website that resembles the original destination ...
TrickBot backend source code leaked

TrickBot backend source code leaked

| | Hack
TrickBot appears to have become a casualty of the ongoing war in the Ukraine. Yesterday, a member of the Conti cybergang decided to go against the rest of the group by leaking ...

The DHS is inviting hackers to break into its systems, but there are rules of engagement

The United States Department of Homeland Security (DHS) is inviting security researchers to uncover vulnerabilities and hack into its systems, in an attempt to better protect itself from malicious attacks. The DHS ...

#TripwireBookClub – Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things

Previously, we reviewed The Ghidra Book: The Definitive Guide because several of us were working with Ghidra, and it was a topic that made sense. Similarly, we spend a lot of time ...
CTO Perspective: Examination of the REvil Ransomware Attack

CTO Perspective: Examination of the REvil Ransomware Attack

By Satya Gupta, Founder and CTO, Virsec Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more than 200 United States companies. The criminals took ...
Anyone Can Be Hacked

Anyone Can Be Hacked

The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years ago, “There are two types of companies: those ...

U.S. Can Expect to see more Ransomware Attacks

In the cybersecurity space, there are many things we do not all agree on, but one thing I have noticed in the past year is that we all agree that the U.S ...

Bad Ending for Washington, D.C.’s Metropolitan Police Department (MPD) after a Ransomware Attack

A group of ransomware hackers known as “Babuk” leaked internal police files from the Washington, D.C. Metropolitan Police Department (MPD).  The information was stolen in late April.  The post Bad Ending for ...

Colonial Pipeline Ransomware Attack

One of the nation's largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack.  Ransomware is a form of malware that encrypts a victim's files. The attacker then ...