Free Risk Indicator Report

Find out what risks you are facing, using our easy and fast risk Intel threat checker! Read More

True Cost of Software Errors

346 people died because of software issues, if we invest in secure code, testing and security in development then maybe those 346 people would not have died in 2 plane crashes. Read More

FaceTime Terrorism

A previously unpublished FaceTime bug allows attackers to record your discussions without your knowledge. Read More

Simply Undetectable

As this year (2019) starts to mature we are and will see more and more attacks that target SMB’s (Small and Medium Businesses) and also larger corporations in ways that (currently) classical security teams are not prepared for. Why do I say this, is it some sales ploy or an attempt at creating fear? Actually… Read More

Datenverstoß in der Sandbox

Die letzten Tage waren gelinde gesagt interessant, der Bundestag wurde wieder einmal gehackt und niemand weiß mehr als vorher. Mit all den fake News und Berichten ist es sehr schwer zu unterscheiden, was an diesem neuen Verstoß real ist und was nicht, oder ob es wirklich ein neuer Verstoß war. Was wir beobachten, ähnelt einer… Read More

Data Breach in the Sandbox

The last few days have been interesting to say the least, the Bundestag got hacked once again and no one is the wiser. With all the “fake” news and reports its very hard to distinguish what is and isn’t real about this new breach or even if it was really a new breach. What we… Read More

Docker Bug: Firewall workaround…

Published December 2018 We wanted to put out a Bug Info for newer Docker installations that interact with MongoDB. Due to changes in how Docker does its routing it and in some cases ignores IPChains and Firewall settings in certain situations that leads to your MongoDB schema and data being accessible with a MongoDB client… Read More

Lojax and OPERATION KRAKEN

Published October, 2018 What’s really going on? If you are reading this, you no doubt have read most of the alerts on LoJax the latest fun tool deployed by our friends from OPERATION KRAKEN or one of its groups APT 28. Since 2015 we have been tracking various types of APTs and Nation-State based technology… Read More

Operation KRAKEN

Article date: September 2018 ~ See also: “Operation KRAKEN strikes again” -published 4th of January 2019 The entire world is facing one of the most comprehensive espionage and disruption campaigns in its history. Throughout our research we always found separate attacks that really had us scratching our heads because we saw so many different types… Read More

Operation: POWERMONGER

Article from March 2018 If you have been following this site and the private one previously you will remember the talks and posts about how easy it is to hack voting machines and also the corrilation to voter databases that where out there on the darkweb. Many folks that where “supposed” analysts claimed I didn’t know… Read More