IoT Devices That make Security Pros Cringe

Just your average information security researcher from Delaware US.

In cybersecurity, if it isn’t one thing, it’s another 14.4 billion things that’ll get ya. That’s about how many Internet

Read more

ieGeek IG20 CCTV Multiple Vulnerabilities – CVE-2022-38970

Amazon’s ieGeek brand may be “highly rated” and “recommended,” but recent security concerns have been raised regarding their CCTV cameras, including the predictable UID weakness in the IG20 model. Read on to learn more. #ieGeek #securityvulnerabilities #CCTVcameras

Read more

APISec: Broken access controls, injection attacks plague the enterprise security landscape in 2022

Just your average information security researcher from Delaware US.

API-related security vulnerabilities continue to be a thorn in the side of organizations, with access control flaws now associated with

Read more

Comparing Twilio and Slack breach responses

Just your average information security researcher from Delaware US.

We recently learned about major security breaches at two tech companies, Twilio and Slack. The manner in which these two organizations responded is

Read more

New Traffic Light Protocol (TLP) standard released after five years

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The Forum of Incident Response and Security Teams (FIRST) has published TLP 2.0, a new version of its Traffic Light

Read more

Targeted attacks on industrial enterprises and public institutions

Just your average information security researcher from Delaware US.

In January 2022, Kaspersky ICS CERT experts detected a wave of targeted attacks on military-industrial complex enterprises and public institutions

Read more

Akamai: We stopped record DDoS attack in Europe

Just your average information security researcher from Delaware US.

A ‘sophisticated, global botnet’ held an Eastern European biz under siege over 30 days Akamai Technologies squelched the largest-ever distributed

Read more

Many wireless peripherals are vulnerable to a range of attacks, here’s an example!

Just your average information security researcher from Delaware US.

Wireless peripherals and computer accessories offer mess-free convenience in the workspace, allowing users to move keyboards and mice to a

Read more

NSA Publishes Top Practices for Improving Network Defenses

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

The National Security Agency (NSA) this week published a set of best practices for organizations looking to improve the overall

Read more

U.S. Gov Issues Stark Warning, Calling Firmware Security a ‘Single Point of Failure’

Connect
Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK.

I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated...

I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK.

I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!
Connect

U.S. government warns that firmware presents “a large and ever-expanding attack surface.” The U.S. government, at the very highest levels, is calling

Read more