720-891-1663

Security News for the Week Ending May 31, 2019

Baltimore Ransomware Attack Could Be Blamed on the NSA I think this is what they call a tease. Technically correct, however. You may remember the NSA hacking tool that got out into the wild called EternalBlue?  It was leaked by the hacking group ShadowBrokers in 2017.  Before that, it exploited a Microsoft  bug that the […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News for the Week Ending September 28, 2018

Cisco Will Eliminate Hard Coded Passwords One Per Month It seems like every patch cycle, Cisco admits to another app that has an undocumented hard coded password.  I have lost track of how many of them they have removed so far, but the number is scary large. What is more scary is that I bet […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Security News Bites for Week Ending August 17, 2018

Hamas Creates Fake Missile Warning App to Hack Israelis The Times of Israel is reporting that Hamas has created and was distributing a fake Code Red rocket warning app. The app, according to Clearsky Cyber Security, takes over the phone and is impossible to remove, even if the app is deleted. Once infected, the app […]

Continue reading → [DISPLAY_ACURAX_ICONS]

Secure Software Development Lifecycle Process Still Lacking

In late 2015 Juniper announced that it had found two backdoors in the router and firewall appliances that it sells.  Backdoors are unauthorized ways to get into these systems in a way that bypasses security.  Kind of like going around to the back of the house and finding the kitchen door unlocked when no one […]

Continue reading → [DISPLAY_ACURAX_ICONS]

What Happens When Your Firewall Loses the War and Joins the Other Side?

Cisco released an announcement that a high severity vulnerability affecting many Cisco ASA firewalls and Firepower security appliances has a proof of concept available in the wild.  This means that even amateurs can take that code, modify it a bit and successfully either force your firewall to randomly reboot or to steal credentials from that […]

Continue reading → [DISPLAY_ACURAX_ICONS]