Yearly Archives: 2024
Bugs in Microsoft apps for macOS could give privileges to attackers
Eight vulnerabilities in six leading Microsoft applications for macOS — including Outlook, Teams, PowerPoint, OneNote, Excel and Word —...
Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog
A critical vulnerability in the Jenkins open-source continuous integration/continuous delivery (CI/CD) automation server, which could l...
TP-Link finds itself in congressional crosshairs over ties to China
Networking vendor TP-Link found itself under scrutiny from Congress over its links to the Chinese government.In an open letter (PDF) to...
Why Cyber Resilience Matters – Theresa Lanowitz – BSW #361
Theresa Lanowitz is the Chief Cybersecurity Evangelist at LevelBlue, a strategic alliance between AT&T and WillJam Ventures, that s...
Breaking the Illusion: How some CEOs’ Perceptions of Hacking Differ from Reality
Hollywood has given us an unrealistic (with the exception of Mr. Robot) and exaggerated portrayal of hacking in movies and TV shows. Fr...
PR Implications After a Cyberattack | OTIFYD
Guidelines for Effective Crisis Response Cyberattacks on critical infrastructure can have devastating consequences, including negative ...
How to shut down a plant remotely in 3 seconds.
How to shut down a plant remotely in 3 seconds.
3…2…1… and boom!
USBKill Remote Trigger
In my hand, I have a remote trigger that can fr...
OTIFYD and Waterfall Security Partner to Secure OT Networks
London, United Kingdom, April 4, 2023: OTIFYD, EMEA’s next generation OT security services and solutions provider , and Waterfall Sec...
Cascading Supply Chain Attack – OTIFYD
In recent years, supply chain attacks have become one of the most significant threats to cybersecurity. Hackers are using these attacks...
Hacking Controller Area Network (CAN Bus)
Hacking Controller Area Network (CAN Bus) What is Controller Area Network (CAN Bus)? In short words, it’s a communication system made f...