Research / Anatomy of a Breach (3)

What the Ecuadorian Data Breach Can Teach Us

The unsecured database contained records for every registered citizen of Ecuador, which included sensitive information, including their name, address, voting preferences, and even their government ID number. First Published 18th September 2019 Thanks to this data leak, some Ecuadorian …

Read Story

GDPR - How Good Intentions Can (Partially) Backfire

GDPR - How Good Intentions Can (Partially) Backfire

A relatively simple, yet effective proof-of-concept has demonstrated that complying with certain aspects of GDPR could potentially put consumers at greater risk, not less. First Published 13th August 2019 "Please give me a copy of my data. It's me. You know... MEEEEE!." 4 min read | R …

Read Story

Ransomware is Still on the Rise

Ransomware remains one of the most popular cyber attack vectors. Given a choice between paying a hefty sum to recover valuable data or not paying and losing access forever, many victims end up choosing to pay. First Published 1st July 2019 In the moment, many feel like they have no ot …

Read Story

NASA Breach Follow Up

A security audit found that the Jet Propulsion Laboratory (JPL) cyber attack involved the installation of unauthorised hardware, which eventually led to numerous malicious attacks against NASA networks. First Published 24th June 2019 JPL do some amazing things. Connecting a Raspberry …

Read Story

On the Australian National University Breach

On the Australian National University Breach

Hackers obtained personal details, including names, addresses, payment cards and other payment information of overseas students’ union leaders from the Australian National University (ANU). First Published 10th June 2019 Foreign relations between China and Australia - in happier times …

Read Story

The Cost Implications of the WhatsApp Hack

What’s perhaps most concerning is the ease with which this attack was carried out. The attackers were able to eavesdrop on users’ phones by simply placing a special WhatsApp call to the device. The user didn’t even have to answer it. First Published 21st May 2019 That feeling when the …

Read Story

When Utilities Become Cyber Attack Casualties

Utilities are sought-after targets for what has been deemed "a cause du jour" for cyber criminals and hacktivists. So if you live in a large, developed nation, assume that your utilities are under near constant attack by multiple actors. First Published 10th May 2019 Such targets can …

Read Story

Asus Live Update Hack

ASUS Live Update (a tool used to update non-IT-savvy users’ ASUS software) appeared to be delivering malware in some instances. This piece of code was then said to self-propagate laterally across entire corporate networks by using a variety of techniques such as VPN connections and RD …

Read Story

Inside a Common Data Breach

Most small-to-medium companies rarely suffer from high-profile, extortion-style attacks. Instead, they suffer data breaches that are most often created by mistakes and negligence. First Published 4th March 2019 Careless staff members cause the highest number of data breach incidents. …

Read Story

The NASA Hack and Areas of Expertise

This is not the first time NASA has been a victim of a cyber-attack. However, this response seems to suggest that the agency is facing a number of compromised systems, but offers no further insights into the incident. First Published 21st December 2018 "That's one small click for man. …

Read Story

Subscribe by email