On February 28th, 2018, GitHub reported that it experienced the largest DDoS attack on record, with a maximum volume of 1.35Tbps. The GitHub Attack Process Many applications use a memory caching system called “memcached“. Administrators […]
T-Mobile Warns of Increase in Phone Hijacking Scams

Over the past few weeks, T-Mobile users have reported receiving strange texts warning them of “phone number port out scans”. What’s Happening at T-Mobile? T-Mobile has confirmed that they have been sending out texts warning […]
Telegram Zero-Day Used to Mine Crypto
Kaspersky Labs revealed today that a previously-unknown attack on the popular messaging app Telegram infects users’ devices with cryptocurrency mining malware. Research indicates that Russian cybercriminals have used this exploit since March 2017 to mine […]
A Quick Intro to chaiOS
Sometimes, we at SCS like to make our posts short and sweet. With chaiOS, we have a great time to do so. The researcher has already removed his exploit on Github. Apple’s actively working on […]
Meltdown and Spectre: What We Know
Last Wednesday, researchers from Google’s Project Zero and various universities released two potentially earth-shattering vulnerabilities with Intel processors. The attacks, named Meltdown and Spectre, allow for a given process to steal information from memory. Meltdown […]
Major Vulnerability Reported in High Sierra
Yesterday morning, a researcher named Lemi Ergin disclosed a major bug in macOS High Sierra. On Twitter, he reported that when making changes to Users and Groups preferences, a login prompt appears. By typing in […]
Bad Rabbit – Yet Another Petya Variant

Bad Rabbit The chain of malware attacks isn’t letting up any time soon. Just this past Tuesday, researchers detected a new variant of ransomware in the wild. Dubbed “Bad Rabbit”, the malware has currently affected […]
The KRACK Attack

The KRACK Attack Researchers out of KU Leuven recently disclosed a major vulnerability in the WPA2 protocol. The attack, known as KRACK, works by forcing the victim to reinstall an already-used key. By replaying message […]
The WannaCry Ransomware Attack
[et_pb_section fb_built=”1″ admin_label=”section” custom_padding=”19px|0px|54px|0px”][et_pb_row admin_label=”row” custom_padding=”0px|0px|27px|0px”][et_pb_column type=”4_4″ parallax=”off” parallax_method=”on”][et_pb_text admin_label=”Text”] On May 12, hackers launched a global ransomware attack that takes advantage of a known Microsoft Windows vulnerability called, “EternalBlue,” for which Microsoft issued patch […]