Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach

Dutch Law Enforcement Data Breach Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when...
MGM Resorts Ransomware Attack

MGM Resorts Ransomware Attack

MGM Resorts Ransomware Attack MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong reasons in September 2023. A ransomware attack disrupted...
UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution

UNIX CUPS Remote Code Execution UNIX CUPS Remote Code Execution The Fallacy of Default Trust “Hello! I’m a Printer! Please Let Me In, thank you!” – It may sound absurd, but this is how attackers can trick your system through the cups-browsed service....
XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094)

XZ Utils Critical Backdoor (CVE- 2024-3094) XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to...
Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster

Deep Dive – CrowdStrike auto-update disaster CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not...