Title: Improper Access Control in DEPUSDT_LEVUSDC Protocol Date: 15/06/2023 Link: https://twitter.com/1nf0s3cpt/status/1669624223059546112?s=46 An attack has occurred on the $DEPUSDT token on the Ethereum blockchain, leading to a significant loss of approximately $69,000. Additionally, the attacker also targeted the $LEVUSDC token, resulting in a loss of approximately $36,000. The attack was made possible due to the existence […]
If artificial intelligence wants to be human so badly, let’s start treating it like one. Right now, we’re seeing a flurry of ‘panic policies’, in which organisations are scrambling to not only define what ‘AI’ is (clue: it’s not just ‘Chat GPT’), but also how to protect themselves against it, whilst not missing out on […]
The Emergence of Blockchain Technology How did we arrive at blockchain technology? Let’s start from the beginning. The internet, which has been in existence for over 60 years, is built on the TCP/IP and OSI model stack. Originally designed for information sharing through the client-server model, the internet has evolved into a powerful technology that […]
Risk Rating: CRITICAL Affected Products: MOVEit Transfer Affected Version: 2023.0.0 (15.0), 2022.1.x (14.1), 2022.0.x (14.0), 2021.1.x (13.1), 2021.0.x (13.0), 2020.1.x (12.1) Patched Version: CVE-2023-34362, CVE-2023-35036 Proof-of-Concepts available: no Vendor: Progress Software Corporation Date: 31/05/2023, 09/06/2023 Introduction: A severe Zero-Day vulnerability was disclosed, which posed a significant risk to Progress MOVEit File Transfer software users. “Progress” […]
In today’s digital age, businesses are more vulnerable than ever to cyber-attacks. As a result, organisations must take a proactive approach to their cybersecurity measures to ensure that they are adequately protected. One of the most effective methods of assessing a company’s security posture is through red teaming. Red team testing involves simulating a real-world […]
Penetration Testing Cost Penetration testing, also known as ethical hacking or white-hat hacking, is like putting on a hacker’s hat (but with authorisation!) to test the security of a computer system, network, or application for vulnerabilities and weaknesses. The goal is to evaluate how secure the system is and how effective its defences are in […]
About the Company Agrimetrics, founded in 2014, is a leading Agri-tech Centre dedicated to revolutionising the agrifood sector through a thriving Data Marketplace that facilitates the sharing, monetisation, and accessibility of data. With a strategic goal of feeding 10 billion people by 2025, Agrimetrics has been at the forefront of utilising data for its operations […]
In an information or cyber security context, a Red Team is a group of ethical hackers that design and execute a series of coordinated technical and social engineering attacks on an organisation’s people, processes, and technology to simulate how an intruder could obtain unauthorised access to its systems or information assets. In simple terms, a […]
Guest Contributor: Benjamin Turner, Chief Operating Officer, Agrimetrics Shortly after Russia’s invasion of Ukraine, I advocated in a BBC news article and North American technology podcast (The Feed) that we should regard parts of the UK’s agriculture and agrifood system as critical national infrastructure. What does it mean to be critical national infrastructure, and why […]
“There has been a 742% average annual increase in software supply chain attacks over the past 3 years”[i] The above statistic might seem implausible, but supply chain cyber attacks have become a pressing issue for businesses as the reliance on technology and interconnected systems have grown. These attacks can compromise sensitive information, disrupt operations, and […]