Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

What Goes Up (to the cloud) Must Come Down

It feels like it was only yesterday that the IT world fell in love with the concept of “the cloud”. It was so easy, you did not need to worry about infrastructure, security, hardware management… oh so many things and you could list it as an Operating Expense instead of an annual capital expense! What was not to love?

Details
By Sean Kalinich
Sean Kalinich
May 01
Hits: 1087

Read more: What Goes Up (to the cloud) Must Come Down

No comments on “What Goes Up (to the cloud) Must Come Down”
Security Talk

What’s in a Term?

One of my least favorite things in cybersecurity is this almost obsessive need from marketing people to develop and push more and more terms and acronyms. It seems that every day we have a new one dropping, many of these are simply a rehash or an additive to an existing term. A good example of this is social engineering. This is typically defined as “The manipulation of people to share information or access systems that they shouldn't.” Yet we now have multiple terms which describe subsets of this larger item, like Phishing, Smishing, Vishing and even the terrible Quishing. Oddly enough, most of these new terms revolve around a protective product and/or service. As they say, therein lies the rub.

Details
By Sean Kalinich
Sean Kalinich
Apr 30
Hits: 1050

Read more: What’s in a Term?

No comments on “What’s in a Term?”
Security Talk

ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact

Although the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that bears discussion and plays heavily into a broader conversation around proper security controls at the edge of the network. For those that might have been living under a rock for the last few months, let’s recap what the ConnectWise ScreenConnect flaw was.

Details
By Sean Kalinich
Sean Kalinich
Mar 19
Hits: 2721
  • Hacking
  • Cybersecurity
  • Vulnerability
  • Ransomware
  • connectwise
  • screenconnect
  • huntress
  • john hammond
  • cve20241709
  • cve20241708
  • slash and grab

Read more: ConnectWise Slash and Grab Flaw Once Again Shows...

No comments on “ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact”
Security Talk

To Release or not to Release a PoC or OST That is the Question

There is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source Tools related to red-teaming. The debate, well really it has devolved into an argument, is very complex, nuanced, and (in full honesty) has multiple contexts that can be applied to it. However, it has become exceptionally binary. We now have the “Pro” side and the “Anti” side… The fact that this is where the line in the sand is being drawn is, well it is almost ignorant.

Details
By Sean Kalinich
Sean Kalinich
Feb 26
Hits: 1929
  • Exploits
  • 0Day
  • Ethics
  • Vulnerabilities
  • proof of concept
  • open source tools
  • responsible disclosure

Read more: To Release or not to Release a PoC or OST That...

No comments on “To Release or not to Release a PoC or OST That is the Question”
Security Talk

There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups

In what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled with much celebration on X (Twitter) LinkedIn, Facebook and elsewhere. The memes flowed freely and even the usual naysayers could not dampen the enthusiasm over this significant event. Especially since it all appears to have been due to an unpatched vulnerability in PHP 8.x.

Details
By Sean Kalinich
Sean Kalinich
Feb 22
Hits: 1894
  • Cybersecurity
  • Law Enforcement
  • Ransomware
  • ransomware as a service
  • nydfs
  • regulation
  • lockbit
  • sec

Read more: There was an Important Lesson Learned in the...

No comments on “There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups”

More Articles …

  1. NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
  2. Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
  3. Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stolen
  4. Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Page 4 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech