Hacking
Security Vulnerability in Saflok’s RFID-Based Keycard Locks
It’s pretty devastating: Today, Ian Carroll, Lennert Wouters, and a team of other security researchers are revealing a hotel keycard hacking technique they call Unsaflok. The technique is a collection of security ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
A Taxonomy of Prompt Injection Attacks
Researchers ran a global prompt hacking competition, and have documented the results in a paper that both gives a lot of good examples and tries to organize a taxonomy of effective prompt ...
Stopping Credential Stuffing Attacks: We Need to Do Better
Do you know what 23andMe, Jason's Deli, North Face, and Hot Topic have in common? They've all been breached by successful credential stuffing attacks in the last year! An attack type that ...
Employee Spotlight – Stefan Dumitrascu
We spoke to Chief Technology Officer, Stefan Dumitrascu For this month’s employee spotlight piece, we spoke to Chief Technology Officer, Stefan Dumitrascu. How long have you been working at SE Labs? I’ve ...
Orange Spain Outage: BGP Traffic Hijacked by Threat Actor
In a recent cybersecurity incident, Orange Spain faced a significant internet outage on January 3, 2024. A threat actor, going by the name ‘Snow,’ exploited vulnerabilities in the company’s RIPE account. The ...
Ambulance service breach affects 900k, 401K phishing scam targets employee credentials
Data breaches are obviously damaging for victims, but organizations that experience such a cyberattack can also suffer great harm as well. Not only could those entities face massive fines, but they also ...
Best of 2023: Best online .apk virus scanners – Hackernet
They are a lot of antivirus software and online scanners available to scan antivirus but only some of them work well. Here we listed the Best online .apk virus scanners that scan ...
3 ways attackers bypass Multi-Factor Authentication
And 3 ways to stop them. Multi-Factor Authentication (MFA) is much more popular than it used to be. It’s easy to use and the enhanced security that it provides is supported by ...
Online Retail Hack
Selling miniature replicas to unsuspecting shoppers: Online marketplaces sell tiny pink cowboy hats. They also sell miniature pencil sharpeners, palm-size kitchen utensils, scaled-down books and camping chairs so small they evoke the ...