How many Bad Cyber-Characters Are There?

As I was listening to “The Future is not Blockchain. It’s Hashgraph.“ I had a question as they were discussing how a potential attack could come into their product, i.e. what if 3 out of 5 cheaters were in a card game? Obviously the cheaters would win, unless the game was found out to be … Read more

Replace your Wi-Fi Router if 2yr+ old

Insignary had some research and created a report that looked into the binary code of most of the routers on the market. Technewsworld has  a story… And Business Insider has a story The short story is that many router companies do not update their devices which would mean customers would have to upgrade firmware, which … Read more

Test your network by Bloodhound

Which Bloodhound might you ask? No not the Dog… But the following program in Kali Linux: Just a slightly different picture and meaning. Cobaltstrike has tested with it and this is his explanation: “BloodHound is a tool to analyze and understand Active Directory Trust Relationships. For an offensive practitioner, this tool can highlight the hops … Read more

Upgrade or Get Hacked (When Patch Available)

Did you hear the latest in Cybersecurity news? No not the news that Pizza Hut was hacked Not the news Hyatt Hotels were hacked. BUT only the news that the supposed secure WPA2 Wifi Protocol is actually vulnerable to attacks. Which essentially means all current wifi access points are not secure. CERT has a list … Read more

Doing the Basics Would Have Saved You

A new Zero-Day attack is out available for attackers. this attack was discussed in the SANS website Internet Storm Center: https://isc.sans.edu/forums/diary/SMBLoris+the+new+SMB+flaw/22662/ SMBLoris – the new SMB flaw The article was written from reviewing a Threatpost article, but was ultimately triggered because of the DEFCon 2017 presentation:   Notice the arrows on right with memory usage on … Read more