The Case for Running Ad Blockers

Johannes Ullrich released a public service announcement today on why you must run an adblocker when using the internet. He claims that ad networks are not doing enough due diligence on the ads that they run on their networks. He provided examples of Google search...

Password Manager Accounts Compromised By Credential Stuffing

NortonLifeLock sent data breach notifications to customers, informing them that hackers have successfully breached Norton Password Manager accounts in credential-stuffing attacks. The company observed unusually high volumes of fail login attempts in December with...

Whatfuscator: An analysis of malicious open source packages

Henrik from Endor Labs recently created a small prototype Go application for detecting malicious packages early. The article shares what his application found, his view on the evolution of malicious packages and what we should be doing to protect ourselves from it....

Critical Vulnerabilities in Connected Cars

Smart cars are great. They allow you to remotely lock and unlock your car, start or stop the engine, provide the car’s gps location, flash the headlights and honk the horn from any location. It could be using the manufacturer’s provided mobile app or via...

Analysis of Leaked AWS Keys in Python Package Index

We’ve been seeing a lot of python related security issues of late, including the leaking of secrets. When python developer Tom Forbes of London heard that Infosys had leaked their AWS keys, he got intrigued. The key that was leaked was not just any AWS key, it...

Slack’s GitHub repository Compromised

Slack recently disclosed that it had a security incident involving unauthorised access to a subset of their code repository. They have observed suspicious activities on their GitHub code repository account, and upon investigation, discovered that a limited number of...

CircleCI security incident immediate actions

CircleCI recently announced that they are investigating a security incident. While they haven’t yet provided any details of the incident or their responses, they have requested two immediate actions to be taken by their customers. The first is to rotate any and all...

Queensland University of Technology suffers Ransomware Attack

The Queensland University of Technology has disclosed that it had suffered a cyberattack. The University had to shut down their IT systems in response and they expect some of those systems to be disrupted for some weeks. Students who are currently enrolled will be...