by Mark van de Laak | Nov 26, 2024 | Deep Dive
UNIX CUPS Remote Code Execution UNIX CUPS Remote Code Execution The Fallacy of Default Trust “Hello! I’m a Printer! Please Let Me In, thank you!” – It may sound absurd, but this is how attackers can trick your system through the cups-browsed service....
by Mark van de Laak | Nov 19, 2024 | Deep Dive
XZ Utils Critical Backdoor (CVE- 2024-3094) XZ Utils Critical Backdoor The Fallacy of Secure Open Source Code How much time would you spend on executing the perfect hack? The user going by the name of ‘JIAT75’ spent almost three years infiltrating and contributing to...
by Mark van de Laak | Nov 12, 2024 | Deep Dive
Deep Dive – CrowdStrike auto-update disaster CrowdStrike Auto-Update Disaster The Fallacy of automatic updates Last July’s CrowdStrike outage led to closed airports, inaccessible bank accounts and hospitals that were only delivering emergency care that did not...
by Mark van de Laak | Nov 5, 2024 | Threat Talks
Breaking the Illusion: Exposing Security Fallacies Find this Threat Talk on Exposing Security Fallacies Breaking the Illusion: Confronting Cybersecurity’s Biggest Fallacies Are we truly protecting ourselves from cyber threats, or are we blinded by outdated security...
by Mark van de Laak | Oct 29, 2024 | Deep Dive
Deep Dive – Binance Exchange Hack Binance BNB Exchange Hack The Binance BNB Chain Attack – A Deep Dive Into Crypto Vulnerabilities Imagine creating millions in cryptocurrency without spending a cent. In this Threat Talk on financial services, ON2IT’s Lieuwe-Jan...