top of page
Digital Exchanges: How to fund your own missile program
I came across a very good article by Chainalysis: Here is a short summary and what you can do to become a target. North Korea siphoned...
Rajesh Kanungo
Feb 7, 20221 min read
320m Ether Heist due to exploit of a delayed signature check fix
Wormhole is a blockchain bridge used to transfer assets from one blockchain to another. For example, you can move assets between Solana...
Rajesh Kanungo
Feb 7, 20222 min read
Cyber-insurance underwriters and brokers are taking a beating
Cyber-insurance Underwriters and brokers are taking a beating due to flawed assessments and unanticipated losses after a sharp increase...
Rajesh Kanungo
Feb 6, 20222 min read
Mobile handset manufacturers insert spyware
Huawei, Xiaomi and OnePlus cellphones are sending extremely detailed personal information, app usage, system info back to their servers....
Rajesh Kanungo
Jan 30, 20221 min read
GriftHorse
GriftHorse: Zimperium zLabs recently discovered an aggressive mobile premium services campaign with upwards of 10 million victims...
Rajesh Kanungo
Jan 30, 20221 min read
Hackers use the Fear of the NSO group to install Malware
Hackers created Malware masquerading as a prophylactic for the NSO group's Pegasus software. They even posted it on a site looking like...
Rajesh Kanungo
Jan 30, 20221 min read
Scanning people vs computer systems
We do have a choice and may want to appeal to our respective governments to help them with their priorities. The UK Ministry of Defence...
Rajesh Kanungo
Jan 30, 20221 min read
Log4j steps
Updated December 16th, 2021 Short Log4j attack mitigation steps : 0. Update to the latest version of log4j version 2.17 or higher 1....
Rajesh Kanungo
Jan 30, 20221 min read
Log4j: Making your customers feel safe
How do you make your customers feel safe from the log4j vulnerability? (a) Say nothing (b) Disclose. I hate to pitch any company, other...
Rajesh Kanungo
Jan 30, 20221 min read
bottom of page