Is your Android phone up-to-date?
💡 Tip for the weekend: Does your Android phone have the latest updates installed?

💡 Tip for the weekend: Does your Android phone have the latest updates installed?

Despite the Easter holidays, a lot of incredible work was done over the weekend by many researchers analysing the details of the xz-utils backdoor. Some examples are: As the situation unfolds, it is becoming clear that this was not just one of the most sophisticated technical (perhaps the most sophisticated) attempts to introduce a backdoor…
An attack on the software build pipeline can to some degree be compared to an attack on your supply chain. Your code can be 100% reviewed, but still the end product will contain malicious code – a very dangerous situation. Defending software build pipelines from malicious attack – NCSC.GOV.UK
A Military-Type Explosive Sent Via USB Drive (gbhackers.com) ⚡ So far, USB-Killer devices were used by attackers (or pentesters) to disable or destroy devices with USB interfaces by discharging a high power electrical shock into the data lines of the USB port. ❗ If you find a USB stick somewhere: Do not plug it into…
What are the emerging cybersecurity threats for 2030? ENISA risks a glimpse into our future… ENISA Foresight Cybersecurity Threats for 2030 | ENISA Be aware that supply chain attacks are on their way to becoming the number 1 threat, according to ENISA. From my point of view, this topic is currently underestimated and we might…
Enjoy the Easter weekend!If you haven’t done yet, this weekend could be an opportunity to update your passwords / authentication methods. Remember those 3 basic measures:
Today I attended the CNA e.V. railway technology forum 2024 in Nuremberg for ICS GmbH. The title of the conference was “Unlocking the opportunities of railtech”, which is both necessary and possible with the help of digital systems such as ETCS, ATO and CTMS – if it’s done in the right way. Cybersecurity plays a vital role in…