Guest on Secure by Galah Cyber Podcast

Guest on Secure by Galah Cyber Podcast

I had the privilege to be Cole Cornford’s guest on his Secure by Galah Cyber Podcast. He starts of by asking which bird I’m most like and why. I said that I’m an owl as everyone in security should be doing lots of listening and watching. It’s...

Proof of Concept Program for Microsoft Teams Malware Delivery

A proof-of-concept program has been recently published that exploits an unresolved security vulnerability in Microsoft Teams. The program, which was released by the U.S Navy’s red team allows the bypass of Microsoft Teams file sending restraints to deliver...

CWE Top 25 Most Dangerous Software Weaknesses

Mitre has recently released their CWE Top 25 Most Dangerous Software Weaknesses list for 2023. CWE stands for Common Weakness Enumeration and this list demonstrates the currently most common and impactful software weaknesses. They are often easy to find and exploit by...

How Not To Do A Force Password Reset

A high school in Illinois recently demonstrated how not to do a force password reset. Oak Park and River Forest High School was doing a cybersecurity audit when they mistakenly reset everyone’s password. This prevented the students from being able to log into...

Stalkerware App Suffers Data Breach

It’s bad enough when apps you use suffers a data breach, its worse when apps you didn’t know you have gets breached. Android stalkerware app, LetMeSpy had suffered a data breach resulting from a security incident on June 21. The app is used to spy or stalk...