by KarinMuller | Nov 26, 2024 | Deep Dive
UNIX CUPS Remote Code Execution UNIX CUPS Remote Code Execution The Fallacy of Default Trust “Hello! I’m a Printer! Please Let Me In, thank you!” – It may sound absurd, but this is how attackers can trick your system through the cups-browsed service....
by KarinMuller | Nov 19, 2024 | Deep Dive
XZ Utils Critical Backdoor (CVE- 2024-3094) XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to...
by KarinMuller | Nov 12, 2024 | Deep Dive
Deep Dive – CrowdStrike auto-update disaster CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not...
by KarinMuller | Oct 29, 2024 | Deep Dive
Deep Dive – Binance Exchange Hack Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this Threat Talk on financial services, ON2IT’s Lieuwe-Jan...
by KarinMuller | Oct 22, 2024 | Deep Dive
Deep Dive – Ballast System Hack Ballast System Hack Ever been asked to hack a boat? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves. It was a scale model, but they made sure...
by KarinMuller | Oct 15, 2024 | Deep Dive
Deep Dive – Securing AIS Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and satellites, preventing collisions and aiding in rescue...