Harnessing FACT for Swift Cyberthreat Response
6 min read
Harnessing FACT for Swift Cyberthreat Response
By Marcello Delcaro on May 1, 2024

In the cybersecurity world, anticipation and rapid response are crucial in safeguarding against emerging threats. Recent events, such as the discovery of a vulnerability in the XZ Utils...

Continue Reading
Don’t Judge an Ebook by Its Cover
3 min read
Don’t Judge an Ebook by Its Cover
By Ron Brash on May 12, 2020

Interesting times lead to interesting opportunities. The current pandemic is proving no exception, but, sadly, it’s an opportunity for some attackers who have laid a rather cunning trap. As...

Continue Reading
Sniffing Out Fakes: From Saffron in Marrakech to Digital Certificates
4 min read
When the Security Researchers Come Knocking, Don’t Shoot the Messenger
3 min read
When the Security Researchers Come Knocking, Don’t Shoot the Messenger
By Eric Byres on November 8, 2018

Our own Jonathan Butts and Billy Rios were interviewed this month on the CBS Morning News about their research showing that medical devices like pacemakers and insulin pumps can be hacked...

Continue Reading
Who Infected Schneider Electrics’ Thumbdrive?
3 min read
Who Infected Schneider Electrics’ Thumbdrive?
By Eric Byres on September 12, 2018

On 24 August 2018 Schneider Electric issued a security notification alerting users that the Communications and Battery Monitoring devices for their Conext Solar Energy Monitoring Systems...

Continue Reading
Building (or Losing) Trust in our Software Supply Chain
3 min read
Building (or Losing) Trust in our Software Supply Chain
By Eric Byres on May 10, 2018

Back in 2014, when I was managing Tofino Security, I became very interested in the Dragonfly attacks against industrial control systems (ICS). I was particularly fascinated with the ways...

Continue Reading
Loading more posts
No more posts to load
1

Stay up to date