Blog

Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be no need to […] Source: With warshipping, hackers ship their exploits directly to their target’s mail room – TechCrunch
New report says flaw with common remote desktop access protocol left millions of users and researchers open to attack. Source: Vulnerability Exposed Microsoft Azure Users to Cyberattack
  Source: Who Owns Your Wireless Service? Crooks Do. — Krebs on Security
Twitter has disclosed more bugs related to how it uses personal data for ad targeting that means it may have shared users data with advertising partners even when a user had expressly told it not to. Back in May the social network disclosed a bug that in certain conditions resulted in an account’s location data […] Source: Twitter ‘fesses up to more adtech leaks – TechCrunch
The top voting machine company in the country insists that its election systems are never connected to the internet. But researchers found 35 of the systems have been connected to the internet for months and possibly years, including in some swing states. Source: Exclusive: Critical U.S. Election Systems Have Been Left Exposed Online Despite Official Denials