Posts Tagged ‘cybersecurity’
Tiro Security 2019: Year in Review
2019 has come to an end and we are now about a week into a new year and new decade. Since all the festivities have finished and most of our clients are back at work focused on 2020, I wanted to take some time to look back at the past year to reflect on…
Read MoreCyber Attacks this Holiday Season: Naughty and not Nice
Cyber Threats Are In Season Christmas season is finally upon us with just another week left to go and while most of us are scrambling to find last minute gifts for our loved ones, we might be overlooking a very important matter. I’m not just referring to the difficult decision of which family to spend…
Read MoreSpeaking at IANS CISO Roundtable
We are excited to announce that one of our Co-Founders Kris Rides will be speaking at the IANS CISO Round-table event in Downtown Los Angeles on Tuesday 15th May. Kris will be discussing “Overcoming Challenges to Build a High Performing Team” with a select group of CISOs. During this 1:1 interview, IANS CEO Phil Gardner will…
Read MoreSXSW 2018 – Speaking on IoT Security
Tiro Security Co-Founder and Head of Penetration Testing, Rob Pope will be speaking at the world renowned SXSW Conference in Austin, TX on the 14th March 2018. Rob will be infusing some of his British humor into the talk entitled Internet of Scary Things: Botnet in a Box. For more information please click here. We have posted these before but here…
Read MoreSpeaking at OWASP LA – February Meeting
We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at the OWASP Los Angeles meeting on Wednesday 28th February. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the…
Read MoreSpeaking at SchmooCon
We are excited to announce that Justin Regele one of our amazing Penetration Testers will be speaking at ScmooCon on Saturday 20th January. Justin’s talk is titled: Better Git Hacking: Extracting “Deleted” Secrets from Git Databases with Grawler Grawler is a command line utility written in Bash and Python that crawls the object trees of a…
Read MoreZero-Day alert: Spectre and Meltdown Widespread Hardware Vulnerability
Your computer, your phone, your tablet, your TV server: if it has a computer chip and can be accessed, it is vulnerable to Spectre and Meltdown. These are the names of data security vulnerabilities found in the physical hardware that is used in nearly all computers and handheld devices dating back over 20 years. Companies…
Read MoreSpeaking today on IoT Security
With the recent launch of Amazon Key the visibility around Smart Homes and IoT Security is an even hotter topic. Insecure IoT devices are helping to create some of the largest botnet networks we have ever seen. These networks are being used to spread malware and create a huge platform for distributed denial-of-service (DDoS) attacks which take down…
Read MoreDEF CON: a Glimpse into the Largest IT Security Convention!
The largest, oldest, and most well-known convention for all things IT Security is DEF CON, which is currently being held in Las Vegas, Nevada! DEF CON began in 1993 as the first hacking convention. It was originally brainstormed as a going-away party for Platinum Net, which was an old hacking network once based in Canada.…
Read MoreNotPetya: the newest Ransomware Threat
Another wave of ransomware has been hitting companies, hospitals, airports, banks, and government systems alike around the world, substantially within the Ukraine, but also affecting computers in France, Denmark, and within the US. Kapersky Labs reported earlier that more than 2000 attacks have been noted thus far. Like other ransomware, NotPetya has locked down computer…
Read More