by Tibor Luter | Aug 24, 2022 | blog
A hacker tracked as TA558 has upped their activity this year, running phishing campaigns that target multiple hotels and firms in the hospitality and travel space. The threat actor uses a set of 15 distinct malware families, usually remote access trojans (RATs), to...
by Tibor Luter | Aug 22, 2022 | blog
The fact that the flaws enable remote code execution, exist across all major Apple OS technologies, and are being actively exploited heightens the need for a quick response. Security researchers are urging users of Apple Mac, iPhone, and iPad devices to immediately...
by Tibor Luter | Aug 18, 2022 | blog
It cost a researcher only $25 worth of parts to create a tool that allows custom code to run on the satellite dishes. SINCE 2018, ELON Musk’s Starlink has launched more than 3,000 small satellites into orbit. This satellite network beams internet connections to...
by Tibor Luter | Aug 16, 2022 | blog
Many modern websites employ an automatic issuance and renewal of TLS certificates. For enterprises, there are DigiCert services. For everyone else, there are free services such as Let’s Encrypt and ZeroSSL. There is a flaw in a way that deployment of TLS certificates...
Recent Comments