Two Frightening Zero-Day Exploits to Make Sure You Never Sleep Again
How bad can a zero-day exploit get? As it turns out, pretty freaking terrible. Zero-day exploits are vulnerabilities in applications, firmware, and operating systems that are exploited before even the original developer of the targeted platform is aware of the...
3 API Best Practices You Need to Start Using Immediately
In today's fast-paced digital landscape, APIs have become the backbone of software integration and innovation. With an ever-increasing reliance on APIs, the need for robust security measures and the use of API Best Practices has never been more critical. As T-Mobile...
APIs – A Powerful, Versatile Tool and Your Achilles Heel, All in One
T-Mobile recently announced that hackers had breached their systems and stolen the records of 37 million customers. While the records apparently didn’t include financial information, enough personal information was taken to create significant risks for the victims....
The LastPass Breach: 3 Steps You Need to Take Immediately [Podcast]
In August of 2022, LastPass announced that they had been the victim of a cyberattack. The hackers had penetrated their security and stolen some company information, including source code. But, they assured the world, no customer information had been accessed. Fast...
Eufy’s Blunder – Don’t Promise what You Don’t Provide [Podcast]
Eufy made a name for itself as a video baby monitor company that provided peace of mind - in the form of top-of-the-line security to protect your privacy. It turns out their promises were more than a little bit hollow. When you promise things like end-to-end,...
8 Lessons from the Uber Hack [Podcast]
So, right from the start, let's clarify - this is about the Uber hack that occurred (or was discovered/publicized) in September of 2022. In fact, it was a rather unique breach of an oft-breached company. The hacker who breached Uber appears to have used very basic...
The Open SSL Vulnerability – What is it and What Can Be Done? [Podcast]
There are key systems that run the basic technology and internet services that we use every day. Many of them have been around, in some way shape or form, for decades. Even more recent versions tend to be based on open-source programming, or built on open-source code....
When is a Cyber War a Real War? [Podcast]
When your business, or a business you rely on, is the victim of a cyberattack, there is always a price that you pay simply for being the victim. There are emergency IT costs, data recovery costs, identity theft protection, investigations, lawsuits, and sometime even...