Long Analysis of the M-209
Really interesting analysis of the American M-209 encryption device and its security.
Really interesting analysis of the American M-209 encryption device and its security.
This story seems straightforward. A city is the victim of a ransomware attack. They repeatedly lie to the media about…
Zyxel, a communications company, has released an advisory warning users of a critical input validation vulnerability impacting many of its…
Managing an organization’s attack surface is a complex problem involving asset discovery, vulnerability analysis, and continuous monitoring. There are multiple…
The NSA’s “National Cryptographic School Television Catalogue” from 1991 lists about 600 COMSEC and SIGINT training videos. There are a…
In an increasingly digital world, the rise of AI-generated deepfakes represents one of the most significant threats to cybersecurity and…
Interesting vulnerability: …a special lane at airport security called Known Crewmember (KCM). KCM is a TSA program that allows pilots…
Presently sponsored by: 1Password Extended Access Management: Secure every sign-in for every app on every device. I still find the…
Details. Blog moderation policy.
The Early Days: Basic Asset Management While it was not called ASM, the concept of managing attack surface management began…