Baltimore Ransomware Attack Could Be Blamed on the NSA I think this is what they call a tease. Technically correct, however. You may remember the NSA hacking tool that got out into the wild called EternalBlue? It was leaked by the hacking group ShadowBrokers in 2017. Before that, it exploited a Microsoft bug that the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco Will Eliminate Hard Coded Passwords One Per Month It seems like every patch cycle, Cisco admits to another app that has an undocumented hard coded password. I have lost track of how many of them they have removed so far, but the number is scary large. What is more scary is that I bet […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Hamas Creates Fake Missile Warning App to Hack Israelis The Times of Israel is reporting that Hamas has created and was distributing a fake Code Red rocket warning app. The app, according to Clearsky Cyber Security, takes over the phone and is impossible to remove, even if the app is deleted. Once infected, the app […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells. Backdoors are unauthorized ways to get into these systems in a way that bypasses security. Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco released an announcement that a high severity vulnerability affecting many Cisco ASA firewalls and Firepower security appliances has a proof of concept available in the wild. This means that even amateurs can take that code, modify it a bit and successfully either force your firewall to randomly reboot or to steal credentials from that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Earlier this month the folks at Cisco were sent into a frenzy when Wikileaks disclosed Cisco exploits in their Vault 7 CIA tool data dump. Wikileaks disclosed that the CIA had been hacking Cisco Internet switches for over a year to eavesdrop on users, but didn’t disclose how. Wikileaks and a number of the tech […]
Continue reading →
[DISPLAY_ACURAX_ICONS]