Uncategorized

Phone Got Wet? – Skip the Rice Trick and Learn Why Apple Advises Against It:

Everyone loves a good life hack. I was watching this Indian film called Shaitaan by Ajay Devgn and Jyothika. That got me thinking about a tech life hack that’s been around forever: putting your wet phone in a bag of uncooked rice. Sure, most high-end phones are water-resistant these days, so they can handle a

Phone Got Wet? – Skip the Rice Trick and Learn Why Apple Advises Against It: Read More »

Fsociety, the fictional hacker group from the TV show “Mr. Robot,” uses VHS tapes:

Mr. Robot has made some short videos to show fsociety’s plans and to warn their enemies about what they are going to do next. The person in the videos wears a plastic mask, a top hat, a tuxedo, and carries a cane. Their voice is changed to sound different. In the first season, Mr. Robot

Fsociety, the fictional hacker group from the TV show “Mr. Robot,” uses VHS tapes: Read More »

[Podcast] Chris Wysopal, Founder and CTO of Veracode: How Hackers Became the Celebrities of Cybersecurity

Chris Wysopal co-founded Veracode, a company focused on software security, which is now worth $2.5 billion. They were among the first to offer software security through the cloud. In his interview, Chris talks about his early days as a member of a famous hacker group called “L0pht,” known for finding flaws in big software companies

[Podcast] Chris Wysopal, Founder and CTO of Veracode: How Hackers Became the Celebrities of Cybersecurity Read More »

[News] Palo Alto Networks Discloses Attack on PAN-OS Flaw

Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under active exploitation in the wild by malicious actors. The company described the vulnerability, tracked as CVE-2024-3400 (CVSS score: 10.0), as “intricate” and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 of the software.

[News] Palo Alto Networks Discloses Attack on PAN-OS Flaw Read More »

China Confirms Successful Decryption of Apple’s “AirDrop”

Chinese authorities claim to have found a solution to identify users of Apple’s AirDrop, an encrypted feature on Apple phones that allows anonymous content sharing with nearby devices of the same brand. China closely monitors media and the internet, exercising control over any content that may portray state policies negatively or cause disruptions. To evade

China Confirms Successful Decryption of Apple’s “AirDrop” Read More »

the 2023 Cybersecurity Nightmare MOVEit data breach

In a shocking turn of events, more than 2600 companies and major government entities worldwide fell victim to the largest cyberattack of the year, affecting nearly 90 million individuals across 30 countries. This breach primarily targeted US government institutions and companies, comprising 88% of the total victims, followed by Canada at 6%, Germany at 1.6%,

the 2023 Cybersecurity Nightmare MOVEit data breach Read More »

International Committee of the Red Cross issued eight rules for civilian hackers to follow during armed conflict.

The eight rules include bans on attacks on hospitals, hacking tools that spread uncontrollably and threats that engender terror among civilians. Based on international humanitarian law, the rules are:  IT Army of Ukraine vs Killnet  Killnet, which has 90,000+ supporters on its Telegram channel. KillNet is a Russia-aligned hacktivist group that gained notoriety during the first

International Committee of the Red Cross issued eight rules for civilian hackers to follow during armed conflict. Read More »