From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 352 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1271 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 713 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 687 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1907 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1397 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1836 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 1601 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1610 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116254 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87103 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81637 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 79999 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70416 times Read more...
Displaying items by tag: Hacking
Adobe Connectuser Forum Hacked and User Passwords Leaked Due to Poor Encryption...
And…. There has been another breach of a “cloud” service. Well, sort of. Adobe’s connectusers.com forum was broken into on Monday. The hack was allegedly performed by Egyptian hacker ViruS_HimA. The Forum was shut down on Tuesday night in response to the attack. Although at this time Adobe is still claiming that nothing beyond the customer forum was breached there is always the potential that other services were affected by the attack. The culprit in this case turns out to be bad password protection.
PIN thievery at Barnes and Noble POS terminals
63 largest U.S. Barnes & Noble bookstores are affected by serious safety problems. Criminals compromised Barnes & Noble POS (Point of Sale) devices and took data from credit and debit cards complete with PIN numbers for those debit cards. In each of the affected stores was found one compromised POS device. Barnes and Noble have more than 700 stores across the U.S. and more than 600 stores for students and professors so this problem is very serious.
Top 25 worst passwords of 2012 announced
The company SplashData has released a list of the "most popular" Passwords of 2012, which listed the most commonly cracked passwords by hackers. The list is based on incidents related to hacking users of different web portals and services, including Yahoo, LinkedIn, eHarmony and Last.fm. In all cases, it was an incredibly simple (read stupid) password, which hackers could crack without any effort. The report points out that many users still do not pay too much attention to the security of their online sessions. According to experts, no matter how much effort is invested in the development of secure systems, encryption, cryptography and anti-hacking tools that are becoming increasingly complex, in the end it all falls apart if users supplied their account to hackers "on a platter" with a password that even little kids could reveal.
Anonymous Pulls All Support From WikiLeaks After WikiLeaks Puts Up a Paywall
The whistle blowing site WikiLeaks has finally stepped over an imaginary line and annoyed Anonymous their one time protector. Although there has been rumblings in the community about the direction that WikiLeaks was heading in the collective was always ready to defend the site and by-proxy its owner Julian Assange. The straw that finally broke the relationship was the creation of a “paywall” that required you to donate or to share content from the site before allowing you to get to the rest of the site. The donations were not just intended to maintain the site either, but to support site owner Julian Assange and his mounting legal bills and living expenses.
It's official, The Pirate Bay founder has been arrested for tax hack
Gottfrid Svartholm has been detained for a tax hack over at a Swedish IT company Logica. Previous rumors ended up being true in this case and he was indeed accused of taking part in hacking Logica and leaking thousands of tax numbers. He was arrested in the Cambodian capital Phnom Penh. He was taken captive there and was extradited back to Sweden last Monday. According to laws, since his visa was expired, he could have chosen to stay in Cambodia if he wanted or go back, but authorities didn’t give him any choice.
Pirate Bay founder arrested for tax hack and not piracy
After Gottfrid Svartholm was arrested last week in the Cambodian capital, Phnom Penh there were many rumors that it was due to his connection with The Pirate Bay. Apparently the arrest has nothing to do with his famous piracy history. He is being held at the interior ministry's counter terrorism department because of hacking a Swedish IT company and leaking thousands of tax records. At first very little was known about his arrest and all we got were speculations from lawyers. Now authorities have confirmed that Svartholm was behind this criminal act. In official statement by a Cambodian spokesman we found out that it has to do with cyber-crime “His arrest was made at the request of the Swedish government for a crime related to information technology,”
Team GhostShell Executes A Few SQL Injection Attacka And Pulls Off Over 1 Million User Accounts...
2012 is most certainly the year of the hack. So far in 2012 we have heard of more large scale security breaches related to allegedly secure companies and banks than in just about any previous year. What make this year very interesting is that it is also the year that many companies are joining the push for the “cloud”. Now the term “cloud computing” has been around for a very long time and derives from the symbol for the internet (which is a cloud if you did not guess) although many view it as a new technology it is not.
Flaw That Stores User Password Hints In Unencrypted Format Still Present in Windows 8
It seems that while Microsoft was busy trying to turn your desktop into a phone they might have skimped on security a bit. According to some very interesting research Windows 8 has a flaw in it that allows for someone to gain access to the list of user password hints directly from the registry in unencrypted form. The flaw, which was found by the gang over at Spiderlabs is not a massive game changer, but it is troublesome and gives a potential attacker even more information to help him or her gain access to your system.
Anonymous Takes out the UK Ministry of Justice Site, Still No Word on a Response against AntiLeaks
WikiLeaks was having a bad time of it about a week ago when the group AntiLeaks popped up on the scene seemingly out of nowhere and started hammering them and their mirrors with a massive DDoS (Distributed Denial of Service) attack. When the news hit that the site was under attack many jumped to the conclusion that it was a state sponsored attack. At least people did until AntiLeaks claimed responsibility through someone that uses the name Diet Pepsi. This led to a merry round of speculation about the group and who they really were. We covered this news from the angle of the technology involved and came up with a good case for the use or Torrent Blocking technology that has popped up on the scene.
New Group AntiLeaks Opens Up DDoS War on WikiLeaks, But Might Not Be What They Claim
There is one thing about the hacking world that is a constant, everything changes. We have seen anti-anonymous and Anti-Wikileaks groups come and go from individuals like The Jester to others that claim they were once with Anonymous, but now have seen the error of their ways and are working for the good of the world. These groups all have one thing in common; they are rarely effective for long. This is not to say they do not have skill or talent. In some cases they are very talented. However their effects are rarely long term.