September 10, 2018 - In this post, we acquire the necessary equipment to analyze the security of an inexpensive portable router, which we access through its diagnostic interface, and poke around inside.
August 31, 2018 - What is regular expression (regex) and what makes it vulnerable to attack? Learn how to use regex safely and avoid ReDoS attacks in the process.
August 27, 2018 - A roundup of the security news from August 20 – 26, including a look at insider threats, several breaches, and what tech giants Google and Facebook are doing about their privacy issues.
August 22, 2018 - Another year, another Defcon. In this retrospective, we take a look at the crown jewel of Defcon swag: badges. Reminisce with us about the coolest badges ever made and traded.
August 20, 2018 - A round up of the security news from August 13 – 19, including an in-depth discussion of what drives the average cybercriminal to crime.
August 16, 2018 - Popular content management systems are easy to install and use. But how easy is it to keep them secure?
August 10, 2018 - Ransomware distributors have started using RDP to gain access to business networks. Do you have your remote desktops under control?
August 8, 2018 - Osterman Research recently completed a major survey on behalf of Malwarebytes to determine the actual cost of cybercrime to businesses. Here's what we discovered.