Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

SolarWinds Supply Chain Attack is the Gift that Keeps on Giving for Security Research

The SolarWinds supply chain attack was and still is one of the most complex and ingenious attacks that has come to light. How it was discovered is also an interesting topic for another conversation. The attack group in question is still being speculated on although one most people tend to gravitate towards is the Russian APT group COZY BEAR (APT29). The actual attack and compromise of the software repository at SolarWinds is the stuff of legend. Once that was completed it allowed the attackers access to a wide swath of business verticals along with government agencies from a single trusted source. They could, almost on a whim, compromise anyone that leveraged the SolarWinds product. Of course, supply chain attacks are nothing new and are not going anywhere. They are complicated to set up and maintain, but once in place they can yield amazing results.

Details
By Sean Kalinich
Sean Kalinich
Feb 02
Hits: 1842
  • Security
  • Malware
  • Crowdstrike
  • solarwinds
  • supply chain attack

Read more: SolarWinds Supply Chain Attack is the Gift that...

No comments on “SolarWinds Supply Chain Attack is the Gift that Keeps on Giving for Security Research”
Security Talk

23 vulnerabilities found in UEFI firmware used across multiple vendors

We first talked about the using the UEFI firmware as an attack vector (At Def Con 22 in 2014). Since that time there have been three identified and disclosed versions of malware that directly targeted this critical subsystem. That would seem to be a relatively small percentage given the time since it was first uncovered, the number of devices that operate using the UEFI firmware subsystem, and the time between then and now. However, this is only ones identified and in most of the identified cases were found because of the method of delivery for the OS payload. This begs the question, are there more out there that just have not been found?

Details
By Sean Kalinich
Sean Kalinich
Feb 02
Hits: 1065
  • Malware
  • UEFI
  • Vulnerability
  • Vulnerability Management
  • uefi security
  • secure boot

Read more: 23 vulnerabilities found in UEFI firmware used...

No comments on “23 vulnerabilities found in UEFI firmware used across multiple vendors”
Security Talk

Device Fingerprinting Takes a Step Forward as the GPU Becomes the Focus

Tracking users and devices as they browse the web is a common thing these days and has been for many years. The technology has evolved from the original tracking cookie to some of the more advanced methods in use now, but the concept is the same. How can someone identify an object on the internet and follow it. Regardless of whether the information is used for “legitimate” or nefarious purposes, the technology remains and continues to move forward.

Details
By Sean Kalinich
Sean Kalinich
Feb 01
Hits: 887
  • Security
  • Tracking
  • hardware tracking
  • device fingerprinting

Read more: Device Fingerprinting Takes a Step Forward as...

No comments on “Device Fingerprinting Takes a Step Forward as the GPU Becomes the Focus”
Security Talk

Just When You Thought It Was Safe to Samba Again, New Vulnerability Allows Remote Code Execution

Samba has released several updates that patch critical flaws in their popular Sever Message Block (SMB) freeware implementation. SMB is a protocol that allows for simple sharing of network resources and has had its share of critical vulnerabilities in the past. The sharing of network resources is a common target for attackers as it can be a quick an easy way to compromise a system. One of the vulnerabilities includes all versions of Samba before 4.13.17 (CVE-2021-44142).

Details
By Sean Kalinich
Sean Kalinich
Feb 01
Hits: 1078
  • Security
  • Vulnerability
  • SMB
  • Vulnerability Management
  • rce
  • samba
  • cve202144142

Read more: Just When You Thought It Was Safe to Samba...

No comments on “Just When You Thought It Was Safe to Samba Again, New Vulnerability Allows Remote Code Execution”
Security Talk

New Apps Allow Retrieval of Deleted Message for Users of WhatsApp on Android

WhatsApp is one of a group of relatively secure messaging services available to both iPhone and Android users. WhatsApp states that it supports full end-to-end encryption, secure deletion of messages (by the sender and receiver) as well as the option to setup disappearing messages. It can also be set to block screen shots of chats which is nice when you want to keep your conversation private.

Details
By Sean Kalinich
Sean Kalinich
Jan 31
Hits: 848
  • Security
  • Privacy
  • Mobile Security
  • WhatsApp
  • messages
  • disappearing mesages
  • wamr

Read more: New Apps Allow Retrieval of Deleted Message for...

No comments on “New Apps Allow Retrieval of Deleted Message for Users of WhatsApp on Android”

More Articles …

  1. Direct Carrier Billing Scam Apps Nab 105 Million Users on Mobile Devices
  2. MFA App on Google Play Store Used to Install Banking Malware
  3. Security Awareness Training Versus Security Culture Building
  4. Apple Patches Safari WebKit Bug and a 0-Day
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

Page 28 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech