by KarinMuller | Jan 28, 2025 | Deep Dive
Salt Typhoon: How Nine Telcos Were Compromised Find Threat Talks on Salt Typhoon: How Nine Telcos Were Compromised Exposing the Vulnerabilities and Fallout In this episode, we cover: 📡 How known vulnerabilities in telco infrastructure were exploited.📡 The types of...
by KarinMuller | Dec 24, 2024 | Deep Dive
Dutch Law Enforcement Data Breach Dutch Law Enforcement Data Breach Imagine the phone numbers of police officers, DAs, and even critical key witnesses being hacked and leaked to the public. This isn’t the opening to some spy novel – it’s what actually happened when...
by KarinMuller | Dec 17, 2024 | Deep Dive
Conti Ransomware Attack on Costa Rican Government Conti Attack on Costa Rica When Ransomware Halts a Nation In a devastating demonstration of the impact of a ransomware attack, the Conti group launched an attack against Costa Rica. The attack led to the country...
by KarinMuller | Dec 11, 2024 | Deep Dive
MGM Resorts Ransomware Attack MGM Resorts ALPHV/BlackCat Ransomware Attack Cybercrime Meets Fake News MGM Resorts, one of the world’s largest casino operators, found itself in the spotlight for all the wrong reasons in September 2023. A ransomware attack disrupted...
by KarinMuller | Nov 26, 2024 | Deep Dive
UNIX CUPS Remote Code Execution UNIX CUPS Remote Code Execution The Fallacy of Default Trust “Hello! I’m a Printer! Please Let Me In, thank you!” – It may sound absurd, but this is how attackers can trick your system through the cups-browsed service....
by KarinMuller | Nov 19, 2024 | Deep Dive
XZ Utils Critical Backdoor (CVE- 2024-3094) XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to...