Cybersecurity
How Is mTLS Implemented?
Proving Identity Is The Hardest Part of mTLS mTLS has significant security advantages, but it also has some implementation challenges such as the establishment of secure mechanisms for services to…
Read moreAI Risks Need To Be Mitigated Urgently & At A Global Level
A question that comes to the minds of a lot of people is if Artificial Intelligence (AI) poses a threat to humanity, along side that of nuclear war and any…
Read moreRocket Alert App Spoofed, Targets Israeli Android Users With Malware
With a war raging between Hamas and Israel, there seems to be a war also being raged in cyberspace that is continuing to emerge. As soon as the first gruesome…
Read moreALERT! – Critical Zero Day Vulnerability Reported by Google in Libwebp
A critical zero day vulnerability that was already exploited in the wild and patched in Chrome by Google has a new CVE ID (CVE-2023-5129). This issue is not a zero…
Read moreAmazon AWS S3 Buckets Used To Deliver Malware Through S3 Buckets
Malicious threat actors are exploiting expired Amazon AWS S3 buckets to place malicious code into legitimate packages in the npm repository with out having to make modifications to any of…
Read morePart 4 De-Anonymizing Domains on the Dark Web – Catastrophic OPSEC Failures
Catastrophic OPSEC (Operational Security) Failures Sometimes Ransomware gangs make catastrophic security mistakes that unmasks their anonymity. In this last post we will look at how such operational security failures such as…
Read morePart 3 De-Anonymizing Domains on the Dark Web – Favicon matching
Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…
Read morePart 2 De-Anonymizing Domains on the Dark Web – TLS Certificate Matching
The first approach used by Cisco's Talos Threat Intelligence team was that of TLS certificate matching. With this approach the self signed certificate that is used by their dark web…
Read moreThe Ability to De-Anonymize Domains on the Dark Web
Members of the Cisco Talos Threat Intelligence team have developed 3 techniques to identify ransomware operators websites hosted on the dark web and their respective IP Addresses. This has given…
Read moreFAQ – What are YARA Rules?
YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…
Read more