From The Blog
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1257 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 765 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1143 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 937 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1005 times Read more...
-
Leaked Data from Duolingo incident Shows US is most Impacted
Written by Sean KalinichDuolingo, is a language learning site (not to be confused with an LLM) and has a very large base of users. The site is a…Written on Tuesday, 29 August 2023 19:12 in Security Talk Read 1421 times Read more...
-
We talk about the Ransomware Threat Landscape with SecureWorks at Black Hat 2023
Written by Sean KalinichBlack Hat 2023 – Las Vegas, NV – One of my personal focuses is understanding the “Why” behind changes in the threat landscape. In simple…Written on Tuesday, 29 August 2023 18:26 in Security Talk Read 1013 times Read more...
-
Now Patched Flaw Leverages Abandoned Reply URL found in Entra ID allows for Privilege Escalation
Written by Sean KalinichMicrosoft has not been having the greatest of months. First it was identified that a stollen MSA signing key was used by a Nation State…Written on Monday, 28 August 2023 15:39 in Security Talk Read 1641 times Read more...
-
Qrypt Looking to Attack the Inefficiencies in Quantum Encryption to make Quantum Secure Communication a Reality Today
Written by Sean KalinichBlack Hat 2023, Las Vegas – At Black Hat one of my favorite things to do is see what the latest buzzword(s)/phrases are. One of…Written on Monday, 28 August 2023 12:53 in Security Talk Read 1136 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115708 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 85991 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 80380 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 79056 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 69249 times Read more...
Displaying items by tag: Spying
CIA Found to have Run Bulk Data Collection Program that May Have Mishandled US Citizen Data.
On December 4th, 1981, then President Ronald Regan signed Executive Order 12333. This Order, further amended by EO13284 in 2003, 13355(2004) and 13470(2008), is what grants and governs the collection of intelligence by Federal agencies. These agencies include the NSA, the CIA and to a lesser extent the FBI and Department of Homeland Security. The collection of information includes what is often referred to as signal intelligence. This type of intelligence if the collection of any information that is transmitted via electronic means. This wonderful blanket definition has been the basis of many borderline illegal data collection programs and a few outright illegal ones.
Recent North Korean Internet Outages Potentially Caused by One Person with a Grudge
In early January 2021 North Korean hackers were in the midst of a campaign targeting western security researchers. They were looking to gather tools, vulnerability information and anything else of value they could get. The US, after learning about this attack did not have a significant response to the threat. Of course, the country was going through a bit of a political turmoil at the time, but there still should have been some sort of response to help prevent further attacks.
New Documents Show the NSA's efforst to break encryption and TOR
Edward Snowden is the gift that keeps on giving. After walking out on the NSA with a ton of secret documents detailing the extent that the agency and their partners were digging into ordinary people’s lives he started to release them. Even after the first and very damaging release of documents Snowden promised that there was more and worse to come. We have seen some pretty bad things coming from the classified document stash including a report that was recently published by Der Speigel.
Judge Posner says the NSA should have unfettered access to your data
It would seem that some in the judicial branch of the US government feel that privacy is not really about protecting citizens from unjustified surveillance. They also do not seem to have any fear of the US becoming a place where the government has powers that extend beyond the ones granted by the US constitution. At least this is the opinion of one US Judge; Judge Richard Posner. The interesting thing is that Posner has made more than a few statements in favor of individuals including condemning the existing copyright system and the way that the copyright lobby is trying to enforce it.
Suspected Windows 10 Spying Will Impact Future Sales
Microsoft had a brief moment in the sun with the release of Windows 10 after the less than stellar market performance of Windows 8.x. However, it seems they are determined to make sure that they screw things up as it was uncovered that the EULA (End User License Agreement) for the Windows 10 Technical Preview allowed them access to a little more than they would usually need for a Beta program.
The NSA and GCHQ want a "Treasure Map" of the Internet
We have more news from the Snowden front as Der Spiegel reports one a joint NSA, GCHQ program dubbed treasure map. Although the program was originally revealed by the NY Times in late 2013 it was originally described as a network mapping program with no surveillance application. This claim is no longer holding up as more and more information come out about the two agencies plans to map the entire internet in real time.
Google Encrypts Search... Too bad it Won't Stop the NSA
The big news today is that Google is preparing to encrypt their search data. They are planning to automatically encrypt not only the connections, but the information sent back to the user. On the surface this would seem to be a big step towards preventing people like the NSA from finding out what we do on the internet and it would be in line with consumer demands for more protection from spying eyes. The question is, will this move actually do anything or is it all just a feel good PR event.
NSA Leaker Edward Snowden talks Live at South by SouthWest
On Monday at the South by Southwest show infamous NSA whistle blower Edward Snowden talk via a live video conference. By all accounts the hall where the conference was held was packed as people were very interested to hear what Snowden had to say. For those of you that might not know, or need reminding Edward Snowden was a contractor to the NSA and is responsible for leaking information about multiple, highly-classified and potentially illegal (unconstitutional) surveillance programs being run on US Citizens and also on foreign diplomats.
Privacy Phone from FreedomPop for $189
After the discovery of mass surveillance by the famous whistleblower Edward Snowden, numerous products with an emphasis on protecting users' privacy appeared on the market. One of them comes from smartphone company FreedomPop and it's called Privacy Phone. Devices that protect privacy often come at a hefty price, but Privacy Phone corrects this complaint and will arrive on the market with a price tag of $189.
Web Companies Scramble to Rebuild Consumer Trust by Pushing Back on Government Spying
Lately the news has had a few articles about how companies like Microsoft, Google, and Yahoo etc. are pushing the government for radical changes to their surveillance policies and demanding better protections for their customers. We have seen new ads focused on explaining how important our data is to them (and in some cases how the other guys are abusing it). The groups lining up and demanding change are many of the same companies that Edward Snowden’s bevy of leaked documents claimed were working hand in hand with the NSA to allow for mass spying on peoples’ data and that in cases where they were not directly cooperating lax security practices allowed for easy retrieval of user information.