Author name: Cymon

Mass exploitation and DDoS attack tools emerge with powerful capabilities

Hacking is often portrayed in the media as an elite technical activity, undertaken by highly-skilled individuals. While this is certainly the case at the most advanced levels, the availability of easy-to-use tools and scripts is increasingly lowering the barrier to entry for novice hackers. Admittedly, this is not a new phenomenon. Popular pen testing suite

Mass exploitation and DDoS attack tools emerge with powerful capabilities Read More »

Processor vulnerabilities raise the Spectre of global Meltdown

2018 started with a bang when, on 3 January, Google Project Zero dropped a bomb in the shape of two papers detailing three vulnerabilities which affected “every Intel processor which implements out-of-order execution…which is effectively every processor since 1995”. The vulnerabilities were dubbed Meltdown and Spectre, and such was their importance that mainstream news outlets

Processor vulnerabilities raise the Spectre of global Meltdown Read More »

Hiding in Plain Sight – Child Abusers on the Darknet

The growing popularity of Tor and other anonymising tools has provided unprecedented opportunities for paedophiles to view and share child pornography online. Before Darknet access became widespread, offenders were forced to purchase obscene materials in high-risk transactions which could expose their real-world identities. These days however, it is a very different story. Explicit images of

Hiding in Plain Sight – Child Abusers on the Darknet Read More »

Vulnerability situational awareness

Vulnerabilities are ubiquitous across nearly everyone’s network infrastructure, and managing them is a monumental task. Staying on top of these flaws is extremely important as they present a viable infection vector for threat actors. Although it is not always an option to patch certain vulnerabilities without a negative knock-on effect to other software, it is

Vulnerability situational awareness Read More »

Scroll to Top