Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack

Deep Dive – Binance Exchange Hack Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this Threat Talk on financial services, ON2IT’s Lieuwe-Jan...
Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack

Deep Dive – Ballast System Hack Ballast System Hack Ever been asked to hack a boat? When Luca Cipriano and Jeroen Scheerder were given the challenge, they took an unexpected approach—step one: build the boat themselves. It was a scale model, but they made sure...
Deep Dive – Securing AIS

Deep Dive – Securing AIS

Deep Dive – Securing AIS Securing AIS AIS (Advanced Identification System) is an incredibly important tool in maritime navigation, allowing ships to transmit their location and data to other vessels and satellites, preventing collisions and aiding in rescue...
Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack

Deep Dive – HTTP/2 Rapid Reset Attack HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. This method enables attackers to generate...
Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach

Deep Dive – Capital One Data Breach Capital One Data Breach Compliance-induced false sense of security Capital One—a leader in finance—learned the hard way that even compliant systems can fail if they’re not configured correctly. In our latest Threat Talks...
Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach

Deep Dive – OKTA Data Breach OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA...