Lax ALM security ‘contributed’ to Ashley Madison data breach

Avid Life Media (ALM), recently rebranded as Ruby Corp, has been heavily criticized for its lax cybersecurity measures, which contributed to the Ashley Madison data breach. According to a joint investigation by the Office of the Privacy Commissioner of Canada and the Office of the Australian Information Commissioner, ALM had “inadequate security safeguards and policies” … More Lax ALM security ‘contributed’ to Ashley Madison data breach

QuadRooter vulnerabilities leaves 900 million Android devices at risk of attack

Over 900 million Android smartphones and tablets are vulnerable to cyberattacks, as they contain a set of four vulnerabilities dubbed QuadRooter. These flaws were found in devices that use Qualcomm chipsets, Check Point revealed at this year’s DEF CON 24 Hacking Conference in Las Vegas. It stated that if any of the four vulnerabilities are … More QuadRooter vulnerabilities leaves 900 million Android devices at risk of attack

Clash of Kings forum hacked, 1.6 million account details put at risk

The details of almost 1.6 million players of a popular smartphone game have reportedly been stolen after the official forums of “Clash of Kings” game were hacked. As ZDNet reports, hackers were able to break into the strategy war game forum – run by Chinese firm Elex – and make off with the usernames, email … More Clash of Kings forum hacked, 1.6 million account details put at risk

Hi, I’m the enemy: Different perspectives on a pentest

Today we are starting a series of articles showing the different angles that can be taken when tackling a pentest. “A PENTEST RECREATES THE ACTIONS CARRIED OUT BY AN ATTACKER IN ORDER TO IDENTIFY ANY VULNERABILITIES” Let’s start by defining what that is. A pentest is an audit process that involves carrying out controlled attacks … More Hi, I’m the enemy: Different perspectives on a pentest

Malicious scripts in compromised websites and how to protect yourself

When talking about the attacks and threats users must face every day, people often highlight those that are more or less predictable, such as malicious archives sent as email attachments. Even though these threats are still very present (e.g. in the different ransomware variants), cybercriminals also use many other attack vectors. Some of the most dangerous … More Malicious scripts in compromised websites and how to protect yourself