Hacking
Buying Campaign Contributions as a Hack
The first Republican primary debate has a popularity threshold to determine who gets to appear: 40,000 individual contributors. Now there are a lot of conventional ways a candidate can get that many ...
Healthcare breach affects millions of patients; Malicious apps found on Google Play store
We are now past the halfway point of the year, and if certain trends continue, 2023 could be another record year for a number of different cyber crimes. Blockchain analysis firm Chainalysis ...
Employee Spotlight – Joseph Pike
We spoke to Security Analyst, Joseph Pike For this month’s employee spotlight piece, we spoke to Security Analyst and heavy metal enthusiast, Joseph Pike. How long have you been working at SE ...
Wisconsin Governor Hacks the Veto Process
In my latest book, A Hacker’s Mind, I wrote about hacks as loophole exploiting. This is a great example: The Wisconsin governor used his line-item veto powers—supposedly unique in their specificity—to change ...
Sowing Chaos and Reaping Rewards in Confluence and Jira
IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...
Millions of Louisiana, Oregon residents exposed in breach; Researchers uncover slate of fake malicious websites
As we approach the summer months, it’s important to remember cybercriminals will not be on vacation. Cyber scams are conducted throughout the year, and malicious actors may try to take advantage of ...
How to Break Into a Cybersecurity Career – Phillip Wylie
In this exciting episode of our podcast we have the pleasure of speaking with Phillip Wylie, a remarkable professional with a captivating career in cybersecurity. Join us as we discuss Phillip’s unique ...
The Jeopardy of Zombie APIs
Let’s unveil the hidden threats to Organizations. In the current digital landscape, organizations are exposed to a variety of risks. There is a rise in Zombie APIs ranking among the deadliest. No, ...
Cyber Attack Due to Malicious Open-source Package
Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the amount of ...
The Software-Defined Car
Developers are starting to talk about the software-defined car. For decades, features have accumulated like cruft in new vehicles: a box here to control the antilock brakes, a module there to run ...