WEMIX Suffers $6M Cyberattack: What Happened and What It Means

On March 4, 2025, WEMIX, a blockchain gaming platform, revealed that they were a victim of a cyberattack. This breach resulted in a loss of more than $6 million of their cryptocurrency assets and raised concerns about their security practices, especially on the developer side. What is WEMIX? WEMIX, a subsidiary of South Korean game …

Confederation of the UNCs – A Brief Look into A Series of the Salesforce Data Theft Exploit

CAUTION: This post is most-likely riddled with a prematurely conceived notion of someone who thinks they can fix cybersecurity for the defenders (we have a lot of those, don’t we?), but hear me out and approach this from the point of view of someone who genuinely wants to work with another person (and another person, …

SharePoint Critical Zero-Day Vulnerability

Your university and your business operations could face serious risks. The Microsoft SharePoint zero-day attack affected many institutions this past summer. Microsoft is urging administrators to take action and use the latest security updates. This exploit is being used in mass attacks. At least 400 organizations have been confirmed to have been breached. The Washington …

Is the EU about to start scanning your text messages?

Imagine you’re sending a secret message, and suddenly someone decides to check what you’re writing. Strange, right? That’s essentially what’s unfolding in Europe right now. The EU is debating a controversial new plan, known as the “Chat Control” law, which would require messaging apps—including privacy-focused services like WhatsApp, Signal, and iMessage—to scan every user’s chats …

Understanding Cryptographic Attacks: Working, Prevention, Real-World Impacts, Strongest and Weakest Algorithm to Specific Attack – Teaching Aide

Meet our Team members: An Introduction to our Project : In today’s digital age, cryptography plays a vital role in securing communication, protecting sensitive data, and ensuring the integrity of information. However, as cryptographic techniques evolve, so too do the methods used by attackers to undermine them. This Teaching Aide will help you to understand …

What is Spyware? Definition, types, how to find and remove spyware from your phone

“Trust not the horse, O Trojans. Be it what it may, I fear the Greeks when they offer gifts” _Virgil. Many of us have heard about the Greek mythology “Trojan horse” where a wooden horse was made for hiding soldier to enter the city of troy during war. No one thought that this small gesture …

Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.

Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …

Post Quantum Cryptography: Kyber for Dummies

On August 13th 2024 NIST published the standards FIPS 203 (Kyber), FIPS 204 (Dilithium) and FIPS 205 (SPHINCS+) which are all quantum resistant algorithms that will soon replace those currently in use. The Kyber standard is a key encapsulation scheme which uses public key enabling and will replace the Diffie Hellman exchange. Dilithium and SPHINCS+ …