Exploit Broker Zerodium Increasing Focus on VPNs The exploit broker Zerodium announced they are seeking exploits for ExpressVPN, NordVPN, and Surfshark VPNs. VPNs are becoming a more lucrative target. Zerodium’s announcement has brought attention to that. Many use VPNs because they believe it protects their privacy. However, it also puts the responsibility of that … [Read more...]
US Agencies Have Been Busy
U.S. Agencies have been making headlines recently for a lot of their new cyber related regulations. The following are several noteworthy of examples of what they have been up to. The Federal Communications Commission (FCC) and Robocalls The FCC expects phone carriers to block illegal robocalls from providers not yet registered with the Robocall Mitigation Database. The … [Read more...]
FCC Again Labels ZTE A ‘National Security Threat
Last month, the FCC again rejected the Chinese device manufacturer ZTE’s request for its removal off of the US national security threat designation. Both ZTE and Huawei fall under this category as a possible risk of espionage. While both manufacturers deny the threat, Chinese law does allow their government to spy on users with few safeguards. "Notably, ZTE didn't … [Read more...]
Net Neutrality Wins – Daily Security Byte EP.32
Folks hoping for Net Neutrality have something to smile about today. In this episode, learn why the Internet is a little more free and what, if any, security implication this may carry. (Episode Runtime: 2:01) Direct YouTube Link: https://www.youtube.com/watch?v=Wx6VNcpe-Dk EPISODE REFERENCES: FCC votes to pass Net Neutrality changes - Ars Technica Long form article on … [Read more...]
WatchGuard Security Week in Review: Episode 10
Georgian Botnets, Mac Trojans, and Carberp... Oh My. I saw so many interesting security stories this week that it was hard to decide which ones to choose for the episode, while still keeping it short. So instead, I concentrated on two themes: interesting new malware and positive security stories. If you'd like to hear about botnets that steal RDP configs, sneaky Mac malware, … [Read more...]