04 Oct 2021

Hackers as Global Private Contractors is a Pandora’s Box You Do Not Want to Open

The U.S. Department of Justice (DoJ) recently fined three former National Security Agency (NSA) hackers who worked as service contractors for a United Arab Emirates (UAE) cybersecurity company named DarkMatter. These three individuals were not the only former ex-U.S. Intelligence officers working for the company. DarkMatter employed more than a dozen former NSA hackers who would use the skills and techniques learned from the NSA to help the UAE target and compromise the phones and computers of its enemies. These “enemies” included human rights activists, journalists, and political rivals. At the core of this issue is the fact that these ex-intelligence operatives used cutting-edge cyber-espionage tools learned from their time in the U.S. Intelligence Community on behalf of a foreign intelligence service.

Read More
03 Sep 2020

U.S. Agencies Must Adopt Vulnerability-Disclosure Policies by March 2021

A new CISA mandate requires US agencies to implement policies that deal with disclosing vulnerabilities by March of 2021. This will provide ethical hackers with clarified guidelines for submitting bugs that they uncover in government systems. As of right now, federal agencies largely lack a formal policy that details receiving

Read More
03 Feb 2020

Breach at Indian Airline Affects 1.2 Million Passengers

Indian airline SpiceJet has been hit by a cyberattack resulting in a massive data breach, exposing the personal information of over a million of its passengers. The computer system of the airline was compromised last month when a security researcher used brute force attack to gain access to an unencrypted

Read More
02 Dec 2019

Kali Linux Adds ‘Undercover’ Mode to Impersonate Windows 10

Kali Linux is popular among ethical hackers and pen testers alike, commonly used by researchers and red teamers to perform security tests. Last week, Kali Linux released version 2019.4 to the public, and the newest version boasts a new ‘undercover’ mode in which users can convert the Linux desktop to

Read More