UAT Student Blog

Texas Driver Licenses of about 27 million have been leaked.

Posted on Nov 17, 2020 1:05:17 PM by Marcos Xochihua in cyber defense, in cybersecurity

Vertafore a company that provides insurance software services has disclosed a data breach in which a third-party got into the details of over 27.7 million Texas drivers. They believe the incident took place from March to August due to a human error where three data files were stored in an unsecured external storage service.

0 CommentsContinue Reading →

What is a Bug?

Posted on Nov 17, 2020 1:05:03 PM by Kody Mitchell

0 CommentsContinue Reading →

Tech that Can Read your Thoughts

Posted on Nov 17, 2020 1:04:51 PM by Kody Mitchell

0 CommentsContinue Reading →

Russia actually arrested a Russian Hacker.

Posted on Nov 7, 2020 11:29:00 AM by Marcos Xochihua in cyber defense, in cyber attack, in cyber security, in cyber terrorism

Something shocking and bizarre to the Cyber Security community has occurred. Russia has arrested a malware author, to give some context to this. Russia is normally very soft with hackers and rarely takes action against them.

0 CommentsContinue Reading →

Bug Bounties in 2020

Posted on Nov 5, 2020 3:43:55 PM by Chad Oertel in money, in Network Security, in Bug Bounty

Cross-site scripting (XSS) has taken the cake in 2020 for being the most impactful vulnerability and thus the one reaping the highest rewards for ethical hackers this year for the second year in a row. This is all according to a list of Top 10 Vulnerabilities released on Thursday by HackerOne.

0 CommentsContinue Reading →

Recording Dreams

Posted on Nov 2, 2020 11:30:00 AM by Kody Mitchell

0 CommentsContinue Reading →

The Evolution of Robotics

Posted on Oct 30, 2020 11:30:00 AM by Kody Mitchell

0 CommentsContinue Reading →

Systems left without passwords for months in Israel

Posted on Oct 29, 2020 11:31:00 AM by Marcos Xochihua in cyber security, in cyber threat, in cyber safety

In a shocking display of poor management over 100 smart irrigation systems were left exposed online without any security or even a password. Which allowed anyone to access and mess with any of the water irrigation which was used for crops, trees, cities, and any building complex.

0 CommentsContinue Reading →

Joker Trojan

Posted on Oct 22, 2020 11:32:00 AM by Chad Oertel in cyber security professional, in degree in network security, in trojans

Joker Trojan Recently a Malware by the name of Joker has surfaced to our eyes. This malware is specifically a trojan that not to long ago began targeting specifically android devices to steal SMS messages, contact lists and device information. The cybersecurity researchers at CSIS has affirmed that the Joker is one of the new types of malwares that is mainly targeting and putting android devices in danger.  Not only will it steal information in also signs the victim up silently for premium wireless application WAP services. All possible plots divide into three separate ranges. Direct download, One-stage download, and Two-stage download. Direct download For this situation, the last payload is being conveyed through an immediate URL that is gotten from the command and control (C&C) worker. In this situation, the contaminated Google Play store application has the C&C address put away in the code itself with chain obfuscation. Subsequent to introducing it, the tainted application speaks with the C&C worker, and afterward it responds with the URL of a last payload. One-stage download Experts in this phase have observed that in order to recover the final payload, the infected Google Play app utilizes a stager payload. “That’s why the infected Google Play store app has the stager payload URL, that is encoded in the code itself and encrypted utilizing the Advanced Encryption Standard (AES). However, the main job of this stager payload is to retrieve the final payload URL from the code and then download it.” Two-stage download For this situation, the tainted Google Play store applications have two-stage payload downloads to recoup the last payload. That is the reason the Google Play infected application downloads the stage one payload, which downloads the stage two payload, that in the long run stacks the end Joker payload. Once the execution of stage one payload Is over, it then proceeds to download the stage two payload, and that is why the stage two payload shows the same performance as stage one payload. 

0 CommentsContinue Reading →

Microsoft's Campaign on TrickBot Update.

Posted on Oct 22, 2020 11:31:00 AM by Marcos Xochihua in Cyber Security, in Microsoft, in cyber defense, in malware, in cyber attack, in cyber crimes, in botnet

As I wrote before a coalition of cyber-security organizations with Microsoft orchestrated a global takedown against TrickBot, which is the second-largest malware botnets.

0 CommentsContinue Reading →


Email me when there is a new post.

I'd like more information about UAT

Lists by Topic

see all

Recent Posts

Posts by Topic

see all

Posts by Author

see all