More Browser Problems!

First couple of paragraphs in Dark Reading story says it all: Both the Google Chrome and Mozilla Firefox browsers currently are under separate attacks, the former from actors exploiting a zero-day bug and the latter from a list of malicious extensions that are actively compromising users. Google rushed out a stable channel update on Monday … Read more

Do you have a Wifi alarm clock?

iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk … assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <——- get:digitMatcher ListTileThemeData get:endOfFrame _drawPicture@15065589 … If you notice the weird address in the file: fwbek2lb0a213kbewqoit.byloftie.com This kind of programming is not a good idea.  her … Read more

Botnet Takes Advantage of Cheap IoT Devices

Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is the Botnet? “BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android … Read more

Make Assessments and Prepare for the Unknown

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering hole tactic is where just like in the desert water is important , and in an oasis there is a watering hole. What does that … Read more