Case VMware: Why Tracking Your External Attack Surface is Critical? 9 May 2023·1223 words·6 mins by: Lari Huttunen To exemplify why defense in depth is essential, we examine a batch of VMware vulnerabilities exploited by ransomware operators.
Painting the Cyber Threat Landscape 11 April 2023·2052 words·10 mins by: Lari Huttunen Join Lari Huttunen for a guided tour through his cyber threat landscape, which casts a light upon early warning.
Deepfake: Unearthing the Status Quo 14 March 2023·2822 words·14 mins by: Max Bineder and Manuel Werka This write-up examines: what deepfakes are, sheds light on why they are dangerous or how they can be detected.
3 Ransomware Precursors Laid Bare in a Cyber Truth or Dare 14 February 2023·1651 words·8 mins by: Lari Huttunen How to prevent a ransomware attack from bringing down your business often boils down to not exposing actively exploited vulnerabilities to the Internet.
Theft-as-a-Service on Ethereum 10 January 2023·2123 words·10 mins by: Ben Weintraub Predatory trading in cryptocurrencies is rampant. One purported solution, Flashbots, has grown quite popular. Is it helping or making things worse?
PHP Version Check - Cold LAMPin' Your IT 13 December 2022·1036 words·5 mins by: Lari Huttunen Running a LAMP server used to be what the cool kids did. Nowadays, cold lampin’ it ain’t cutting it no more.
How to Identify Attack Surface that Must be Addressed 8 November 2022·2300 words·11 mins by: Juhani Eronen How can you identify threats to network security through attack surface assessments and prioritise the findings to fix the discovered issues.
WordPress Version? Make Sure You're Running the Latest Supported 11 October 2022·1631 words·8 mins by: Lari Huttunen Running an unsupported version of WordPress will expose you to unnecessary risk of getting hacked which is possible, if not easy to avoid.
Software Dependency Failures: jQuery, a Canary in the Coal Mine 13 September 2022·1491 words·7 mins by: Lari Huttunen How a vulnerability in a popular javascript library can act as an indicator of poor information security practices for an entire host or a service.
Integrity Checking - an Integral Part of Cyber Security 12 July 2022·2293 words·11 mins by: Tomi Koski and Joona Hoikkala A case study in responsible vulnerability disclosure for a man in the middle attack in FreshService inventory management software.