Defensive Security Podcast Episode 261

https://www.bleepingcomputer.com/news/security/hackers-are-taking-over-ceo-accounts-with-rogue-oauth-apps/
https://blog.f-secure.com/insight-from-a-large-scale-phishing-study/
https://www.darkreading.com/attacks-breaches/log4j-proved-public-disclosure-…

Read More >>

Universal Plug and Play (UPnP): What You Need to Know

Universal Plug and Play (UPnP) is a widely used protocol with a decade-long history of flawed implementations across a wide range of consumer devices. In this paper, we will cover how these aws are still present on devices, how these vulnerabilities ar…

Read More >>

UPnProxy: Eternal Silence

UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.

Read More >>