Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

Another Day Another Active Exploit in a Enterprise Tool as Ivanti warns of Exploited MobileIron 0-Day

It used to be a common phrase that the only certain things are Death and Taxes. These days it seems the list has been extended to Death, Taxes, and 0-days in enterprise tools sets. We have seen a number of zero days being abused since the beginning of 2023 such as Barracuda spam filters, MoveIT MFT, Citrix File share MFT, and (the subject of today’s article) Ivanti’s Sentry (the service formerly known as MobileIron). The uptick in exploitation of 0-days is very concerning just on their own, but when looked at as part of a larger effort, it is borderline frightening.

Details
By Sean Kalinich
Sean Kalinich
Aug 21
Hits: 2756
  • Hacking
  • APT
  • Cybersecurity
  • ivanti
  • ivanti sentry
  • mobileiron

Read more: Another Day Another Active Exploit in a...

No comments on “Another Day Another Active Exploit in a Enterprise Tool as Ivanti warns of Exploited MobileIron 0-Day”
Security Talk

Qwiet AI Looks to Bring a Smooth and Clean Sound to Development Security

Black Hat 2023 – Las Vegas. Sitting in one of my favorite bars in the Mandalay Bay Shoppes, 1923 Prohibition Bar, I had an opportunity to sit down and talk with Stuart McClure. For those that do not know, I worked at Cylance while Stuart was CEO there and left shortly after Blackberry purchased the company. We spent a few moments talking about the Cylance days and how the concept of Cylance impacted the cybersecurity industry. It was one of those times when the right concept was introduced at the right inflection point and combined with the right team to get it into the hands of the public. From there we moved on to Stuart’s latest endeavor, Qwiet AI.

Details
By Sean Kalinich
Sean Kalinich
Aug 18
Hits: 1391
  • AI
  • Cybersecurity
  • math model
  • qwiet ai
  • devsecops
  • develoment security
  • deep learning
  • supply chain security

Read more: Qwiet AI Looks to Bring a Smooth and Clean Sound...

No comments on “Qwiet AI Looks to Bring a Smooth and Clean Sound to Development Security”
Security Talk

Hacker Summer Camp 2023 Recap and My Thoughts

Las Vegas – So Black Hat 2023 and Def Con 31 have come and gone, and while the exhaustion that comes from this epic combined event might not be completely gone, I am ready to give my thoughts on the events. Before I get started, understand that this is my personal opinion on the show(s) as well as my general takeaways from them. As always, your milage may vary. Either way, I hope that you enjoy the article below and that your time and camp this year was amazing (mine was). So, let’s get started!

Details
By Sean Kalinich
Sean Kalinich
Aug 16
Hits: 1704
  • Hacking
  • Black Hat
  • Cybersecurity
  • DEF CON
  • eclypsium
  • def con 31
  • black hat 2023
  • halcyon
  • qwiet ai
  • hacker summer camp
  • hacker family

Read more: Hacker Summer Camp 2023 Recap and My Thoughts

No comments on “Hacker Summer Camp 2023 Recap and My Thoughts”
Security Talk

The Odd Duality of AI and its Unexpected Negative Impact on Cybersecurity

As we head into Hacker Summer Camp in Las Vegas, the emails are already flowing freely into my inbox. Some of them are the regular players that I see every year and others are new. Still more are people that I hear from each year but with new faces to talk to. This is part of what I love about going out to Black Hat, talking new people, talking to well known people in the industry and then getting an understanding of what everyone thinks is the “big thing” for cybersecurity. This year, by far, it is AI and automation.

Details
By Sean Kalinich
Sean Kalinich
Aug 03
Hits: 1585
  • Hacking
  • Security
  • AI
  • Cybersecurity
  • Security Tools
  • Security Culture
  • chatgpt
  • machine learning
  • math model

Read more: The Odd Duality of AI and its Unexpected...

No comments on “The Odd Duality of AI and its Unexpected Negative Impact on Cybersecurity”
Security Talk

June NPM Attack Attributed to North Korea in Recent Phylum Report

Hey, remember that supply chain attack on NPM that happened recently? Which one? Yeah, that is sort of the problem with recent supply chain attacks. In particular the ones that are targeting the development pipeline. This is because they are starting to happen so often that they all blur together, yet NPM and other critical components of the development supply chain are still targets for attackers to either get their malicious packages onto development systems, or in the final compiled binary that is then sent out to the general public. To call this problematic is to describe a nuclear bomb as a big firecracker. Ok, soapbox on the importance of SDLC (Software Development Lifecycle) hygiene and security put away for now.

Details
By Sean Kalinich
Sean Kalinich
Jul 31
Hits: 1170
  • Hacking
  • Cybersecurity
  • supply chain attack
  • npm
  • sdlc
  • sbom
  • phylum
  • jade sleet

Read more: June NPM Attack Attributed to North Korea in...

No comments on “June NPM Attack Attributed to North Korea in Recent Phylum Report”

More Articles …

  1. Browser and App Pivots are part of the Problem, Seraphic looks to Address this with one Agent to Rule them All
  2. Cybersecurity needs to Stop Fighting the “Last War” as Attackers Pivot easily Between Vectors
  3. How to Start Building or Improving Your Cybersecurity Program
  4. Crypto Mining Malware Targeting Linux and Linux Based IoT Devices Show How Little we have Progressed in IoT Security
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11

Page 7 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech