The Decline of SSL VPN: Why Ivanti Connect Secure is Abandonware 8 October 2024·1177 words·6 mins by: Lari Huttunen Learn why SSL VPNs such as Ivanti Connect Secure are becoming obsolete. Explore the history of ownership changes, recurring severe vulnerabilities, and inadequate security measures that have led to the decline of this technology.
Protecting Your Backups: The First Step to Recovering from Ransomware 10 September 2024·1169 words·6 mins by: Lari Huttunen Wondering if your data is safe from ransomware? Discover why securing your backups is the crucial first step toward a successful recovery and explore strategies to protect your data effectively.
The Fallacy of Security Through Obscurity 13 August 2024·1319 words·7 mins by: Lari Huttunen Why Hiding Software Banners Fails as a Defense: Understand why concealing software identifiers doesn’t stop attacks and leaves your systems vulnerable.
A Tour through the SPAM Fighting State-of-the-Art 9 July 2024·2127 words·10 mins by: Lari Huttunen Explore a somewhat opinionated and mildly rebellious take on anti-SPAM solutions for self-hosted email services.
Reality Check: AI and Its Actual Role in Cyber Crime 11 June 2024·1574 words·8 mins by: Laura Kankaala AI is increasingly being used by cybercriminals to deceive and manipulate vulnerable individuals, blurring the lines between reality and digital threats.
Audio Deepfakes and Voice Cloning - When you can't trust your own ears 14 May 2024·1448 words·7 mins by: Manuel Werka An overview of the state-of-the-art in audio deepfakes, whether based on text-to-speech or voice cloning.
Black Sheep Wall: Clearing the Fog-of-War for Cyber Intelligence Collection 9 April 2024·1640 words·8 mins by: Dr. Bernhards Blumbergs Strengthen situational awareness and intelligence collection with a multi-viewpoint approach, ensuring a cohesive perspective.
Exploring the Realm of Cyber Early Warning Systems 12 March 2024·1358 words·7 mins by: Lari Huttunen Unlocking the Potential of Cyber Early Warning Systems with UNDRR Four-Field Methodology.
Forgotten Protocol Chronicles: Do Not Underestimate the Installed Base 13 February 2024·1119 words·6 mins by: John Kristoff John Kristoff examines the risk involved in forgotten, yet active protocols hidden in plain sight through two case studies.
Exposed pfSense - Yet Another Management Interface Examined 9 January 2024·1036 words·5 mins by: Lari Huttunen Exposed management interfaces, such as the pfSense Web UI endanger the confidentiality, intergrity and availability of the whole networks they protect.