Akamai Sees Largest DDoS Attack Ever Cloudflare says that one of its customers was hit with a 1.44 terabit per second denial of service attack. A second attack topped 500 megabits per second. The used a variety of amplification techniques that required some custom coding on Akamai’s part to control, but the client was able […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If that headline doesn’t scare you, it should. Ripple20 is a family of 19 vulnerabilities that are part of a library that is used in medical devices, home automation devices, oil & gas controls, networking devices and other industrial control devices. The bugs are in a library that was developed in the 1990s and is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The Vault 7 leak, in which Wikileaks posted information about a large number of CIA hacking tools was possibly the worst national security compromise the Agency has ever seen. Not only did it reveal our techniques for hacking foreign systems but the hackers repurposed those tools and hacked American and other friendly companies and governments. […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A survey of small and medium size businesses asked executives about their Recovery Time Objectives or RTOs. A company’s RTO represents the amount of time a system, such as a web site, can be down after an incident. The incident could be a software error, hardware failure, ransomware attack or many other things. Here are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Singapore Updates Contact Tracing App Singapore is not exactly a democracy, so this isn’t a complete surprise. They are updating their contact tracing app to include foreigner’s passport number and scanning of barcodes to facilitate tracking when someone enters a store or mall or restaurant. They would like the program to run in the background, […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As IoT devices proliferate, a lot of them don’t get updated. Ever. Some IoT devices automatically update themselves, but a lot of them do not have the smarts to do that. Hopefully all of them talk to their controller over HTTTPS – encrypted traffic. But there is a problem with that. HTTPS certificates expire and […]
Continue reading →
[DISPLAY_ACURAX_ICONS]