Port of Seattle Cyberattack: Rhysida Ransomware Breach and Recovery Efforts

Summary of attacks On August 24, 2024, a ransomware attack led by the Rhysida ransomware organization took over the port of Seattle. This attack severely affected critical systems at Seattle-Tacoma International Airport, including facilities, check-in areas, ticketing, Wi-Fi, passenger transport identifies exhibits in conjunction with critical disruptive services: port website, TSA wait time information, SEA …

Defense In Depth and the continuous rise of Cyber Attacks

There is a significant rise in Cyber attacks across the world, someone falls victim approximately every 11 secs and there is a 15% increase in Ransomware attack in North America in 2024. With this continuous rise in Cyberattacks it is no longer a matter of if but when you get attacked! One or two security …

Alberta, and Western Canada Co-Operatives Cyber-Attack

In early July 2024, Albertans lined up at gas stations and grocery Co-Op stores. The impact was publicly realized after a formal announcement from by the Federated Co-Operatives Ltd (FCL) on the 27th of June 2024 confirming a security incident on western FLC stores. The cyber-attack widespread knocked out hundreds of Canada’s Co-Op western stores …

How Hidden Commands to AI Systems Compromise User Privacy

In recent times, there has been a significant increase in large language modeling software, specifically generative AI, as a result, many users are able to incorporate these throughout their daily usage. However, researchers and hackers have been working to find weaknesses within these AI systems, one particular category being prompt injections (Burges, 2024). This recent …

The Growing Threat of AI Impersonation Fraud – Deepfakes

Imagine a world where anyone’s voice or face can be convincingly faked, blurring the line between real and fake. This is the growing threat of deepfake technology, allowing cybercriminals to impersonate people with striking resemblance. What are Deepfakes? Deepfakes are advanced synthetic media that can convincingly imitate people using altered images, audio, and videos1. The …

Teaching Aid: Understanding Wireless Security and securing home IoT network

I am glad to share my teaching aid on wireless security with a focus in safeguarding IoT devices. In this teaching aide I talk all about wireless connectivity and authentication modes. Then, I delve into analyzing risks, challenges in securing our home wireless networks and steps we can take to secure our home Wi-Fi. The …

EXPLORING BLIND SSRF (SERVER-SIDE REQUEST FORGERY) AND MITIGATIONS

Let us delve into the concept of Server-side request Forged (SSRF), a security vulnerability that allows an attacker to trick a server into performing unintended requests on their behalf. In an SSRF attack, the server is tricked into connecting to external or internal resources, potentially exposing sensitive information or allowing unauthorized access. This occurs when …

Walkthrough : Routing Protocols (BGP and OSPF in Network Security)

Understanding how routers communicate is crucial for maintaining secure and reliable networks. Throughout this teaching aide, you will gain insights into two primary types of routing protocols: Interior Gateway Protocols (IGP) like OSPF, which operate within a single organization, and Exterior Gateway Protocols (EGP) like BGP, which manage routing between different autonomous systems. What You …