From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 696 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1575 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1109 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1080 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2130 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1851 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2122 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2097 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1890 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116522 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87467 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 82025 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80334 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70985 times Read more...
Displaying items by tag: NSA
The NSA Mines Data from Nine Internet Companies Under PRISM
What do Apple, Microsoft (Including Skype), Google (YouTube), Facebook, Yahoo, and PalTalk have in common? Well they all participate knowingly in one rather invasive program run by the NSA under the guise of National Security. The program called PRISM was started in 2007 in the last moths of the George W. Bush’s administration the program creates a cooperative system with the listed companies to allow the NSA to query systems for information. Ostensibly the program is intended to protect the US from foreign threats including terrorism, but it has such a wide license that it has already been shown to have captured data about US citizens. To make matters worse certain members of Congress knew about the project back in 2007 and even granted the DOJ the power to force companies to comply in 2008.
Just what is the FBI's National Domestic Communications Assistance Center For?
So the FBI has started a new club and one that involves the US Marshals, the DEA and apparently even the NSA. This clubs whole purpose is to find ways to monitor and decrypt data that transferred through electronic communications. Sounds fairly innocuous right? After all these law enforcement agencies should have the tools they need to investigate crimes and to prevent threats to national security. The problem comes from the fact that the club (called either the National Domestic Communications Assistance Center or Domestic Communications Assistance Center) might have been around since 2008 without anyone telling anybody.
CISPA On the Floor of the House For Debate Right Now 4-26-2012
Well we knew it would come to this, despite growing outcry against the Cyber Intelligence and Sharing Protection Act the House of Representatives (who are they representing?) is holding a debate on this controversial bill. We have talked about CISPA in the past and the bills that led up to what is nothing more than a revocation of your right to private communication in the past and what the implications of a bill so loosely outlined will mean in the coming months.
How About An ISP That Actually Values Your Data and Privacy. Meet The Caylx Institute
There is an old saying; “ I cannot give you what I do not have and I cannot tell you what I do not know”. It is with this philosophy in mind that a new Internet Service Provider is seeking to hit the market. The man behind this new company also happens to be one of the only ISP owners to ever fight and win against an FBI request for subscriber information; Nicholas Merrill.
Symantec Joins the NSA in Spreading FUD...
Symantec, perhaps in an effort to reclaim some of their reputation, has released a report claiming that some people involved in the DDoS attacks after the MegaUpload take down may have been tricked into downloading a data stealing virus. In a post on Symantec’s own blog they have built a nice (and plausible) timeline of events complete with images (although no links) showing how this happened right around the 20th of January. Many news sites have picked this up and are busy wirting articles about how Anonymous has been hacked... Now the question is, is any of this true?
Why We May Never Have A Truly Free and Open Internet
In the very recent past the NSA and other governmental agencies have tried to show Anonymous as a terrorist organization. To do this they are using very basic definitions of the term; after all a terrorist uses fear to achieve their goals. However, if you can qualify Anonymous as a terrorist organization based on the loose definition and the fact that fear of them uncovering the truth has led to changes in many areas then you can also classify the MPAA, RIAA, NSA and other organizations as terrorist too.
The NSA is trying to spread FUD about Anonymous to cover holes in US Infrastructure Security
The National Security Agency has just released a report to the powers that be in the US that expresses concern that the online activist group Anonymous could go after the US power grid in the next 3-5 years (we told you things like this would happen). This report was put together by their counter terrorism group and while it lacked any details in the body of the report (like the axis for attack) and forgot to mention there are other people out there that would like to do this (like foreign countries and real Terrorists) it does raise some real concerns.