Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Fear and Ignorance in Las Vegas, how FUD has Directly Impacted DEF CON 32 Attendees

The word “Hacker” can invoke many images and feelings. Everything from a bad (yet awesome) movie from the 90s, to a hooded figure sitting in a dark room, their face only lit up by monitors as they prey upon the innocent to a video game protagonist taunting you as you run through corridors in a space station. However, its most common usage and meaning, for the general public (normies) is of criminals who are hell bend on stealing everything by any means necessary. This latter meaning, the FUD around it, and pure ignorance, has led to some real-world consequences for attendees at DEF CON 32.

Details
By Sean Kalinich
Sean Kalinich
Aug 15
Hits: 1117

Read more: Fear and Ignorance in Las Vegas, how FUD has...

No comments on “Fear and Ignorance in Las Vegas, how FUD has Directly Impacted DEF CON 32 Attendees”
Security Talk

Phishing Judo Arrives as Guardio Labs Unveils EchoSpoofing Exploit used against ProofPoint

***Updated 07-29-2024 14:27 EDT***
Judo is a well-known martial art which centers on using an attacker’s momentum, weight, and even size against them with often brutal effect. The throws, tosses, holds are all designed to control or deflect your enemy with least amount of energy expended. When I first read the Guardio Labs paper on EchoSpoofing Judo came immediately to mind. After all attackers are leveraging the systems of ProofPoint to further their efforts. So, with this in mind, let’s step into the Dojo to dive into the details of this attack.

Details
By Sean Kalinich
Sean Kalinich
Jul 29
Hits: 1709

Read more: Phishing Judo Arrives as Guardio Labs Unveils...

No comments on “Phishing Judo Arrives as Guardio Labs Unveils EchoSpoofing Exploit used against ProofPoint”
Security Talk

CrowdStrike’s Thursday Goof Creates Chaos with Systems and Social Media

On Friday July 19th at 04:09 UTC (11:09 EST, 8:09PM PST Thursday July 18th) CrowdStrike pushed out an “update” heard round the world. This “update” consisted of a routine push of a sensor configuration file, called a channel update file. The configuration update includes changes to the behavioral analysis engine and other updates to how the Flacon Engine operates while it provides protection. This is nothing new and happens often with many EDR engines that are either ML based, or which contain behavior models. The problem this time is that there was a “logic error” in a file (C-00000291-.sys). This caused the agent to crash during the boot process. This logic flaw impacted roughly 8.5 million systems before CrowdStrike was able to correct the issue and replace the file.

Details
By Sean Kalinich
Sean Kalinich
Jul 22
Hits: 1350

Read more: CrowdStrike’s Thursday Goof Creates Chaos with...

No comments on “CrowdStrike’s Thursday Goof Creates Chaos with Systems and Social Media ”
Security Talk

So, you started your own business --what next? Well time to think about security.

As someone who has recently started their own business, the title of this article is one that I have seen in different formats in multiple courses, videos, webinars, etc. (I will just refer to them as courses moving forward) on what to do to get your business going. These courses talk about very important things when it comes to starting, funding, and running a business. A topic that is rarely covered (with a few exceptions) is how to properly protect and govern your business systems and client data. This omission has become more and more evident to me as I work with small businesses, especially when trying to help them navigate through a security incident. So, let’s see if I can add some information into the standard “start-up” process.

Details
By Sean Kalinich
Sean Kalinich
Jul 09
Hits: 1237

Read more: So, you started your own business --what next?...

No comments on “So, you started your own business --what next? Well time to think about security.”
Security Talk

Is the Kaspersky Ban a Knee Jerk Reaction and Missed Opportunity? We Talk to Huntress about it

There is a bit of a tongue-in-cheek theory which states that politicians will often expend a lot of energy to appear to be going to great lengths to address a problem while actually doing very little to solve it. While this might bring a chuckle to some when mentioned, there are times when it seems sadly accurate. Some of the times are when we hear political talking heads discussing a complex and nuanced problem stampede towards a “ban” on something. There are examples of this throughout history and they keep popping up in modern times. A recent example is the “ban” on Kaspersky. On the surface the move is portrayed as a national security move due to perceived connections with the Russian Government. However, considering this is not the first time this has been talked about, I have to wonder if that is really what is going on.

Details
By Sean Kalinich
Sean Kalinich
Jul 08
Hits: 2416

Read more: Is the Kaspersky Ban a Knee Jerk Reaction and...

No comments on “Is the Kaspersky Ban a Knee Jerk Reaction and Missed Opportunity? We Talk to Huntress about it”

More Articles …

  1. Has Security by Obscurity Become Depreciated? SMBs Appear to be a Proving Ground for Attackers according to Huntress.
  2. Is Fully Homomorphic Encryption an Option to Combat Data Theft? Duality Technologies Says Yes
  3. Have Cybersecurity Conferences Become Tone Deaf?
  4. Does Cybersecurity Have a Communication Problem?
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 2 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech