Cybersecurity

A JPEG With A Payload

Over the weekend, Xavier posted about another image with a payload: "More Steganography!". Xavier did a static analysis, and I want to explain how you can decode the payload if...
spot_img

Chromecast chaos – 2nd gen devices go belly-up as Google struggles to fix certificate issue

Has your old Chromecast suddenly developed a problem?You're not alone it seems.Many users of second-generation Chromecast and Chromecast Audio streaming devices have discovered that...

Chris Rock – Darknet Diaries

Full Transcript Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells...

No, you’re not fired – but beware of job termination scams

Some employment scams take an unexpected turn as cybercriminals shift from “hiring”...

Soft-Launching and Open Sourcing the Have I Been Pwned Rebrand

Designing the first logo for Have I Been Pwned was easy: I...

Little fires everywhere for March Patch Tuesday – Sophos News

Microsoft on Tuesday released 57 patches affecting 10 product families. Six of the addressed issues are considered by Microsoft to be of Critical severity,...

Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks

The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian institutions and government entities since November...
spot_img