CMMC – The smoke is clearing
The smoke is finally starting to clear on “CMMC 2.0.” Hundreds of companies are already lining up for Cybersecurity Maturity Model Certification assessments. Everything is taking place faster and with…
Hacking Ham Radio: WinAPRS – Part 4
In part three of this series, we discovered and traced a memory corruption bug in WinAPRS using IDA Pro and WinDbg. We discovered that it could be used to gain…
CMMC – The smoke is clearing
The smoke is finally starting to clear on “CMMC 2.0.” Hundreds of companies are already lining up for Cybersecurity Maturity Model Certification assessments. Everything is taking place faster and with…
A survey of FedRAMP’s new supply chain requirements
Over the past few years, supply chain management has shifted from a background requirement that everyone unknowingly relies upon, to being a commonly talked about aspect of our everyday lives.…
Hacking Ham Radio: WinAPRS – Part 4
In part three of this series, we discovered and traced a memory corruption bug in WinAPRS using IDA Pro and WinDbg. We discovered that it could be used to gain…
Hacking Ham Radio: WinAPRS – Part 3
In part two of this series, we reviewed our WinAPRS software and hardware configuration. We then began reverse engineering WinAPRS and fuzzing it for vulnerabilities using modified open-source software. Finally,…
A survey of FedRAMP’s new supply chain requirements
Over the past few years, supply chain management has shifted from a background requirement that everyone unknowingly relies upon, to being a commonly talked about aspect of our everyday lives.…
A little actually doesn’t go a long way: Fight the urge to shortcut your TPRM program
Third Party Risk Management (TPRM) is hard to get right. Ineffective TPRM is when 83% of legal and compliance leaders identify third party risks after due diligence, despite spending 73%…
Hacking Ham Radio: WinAPRS – Part 3
In part two of this series, we reviewed our WinAPRS software and hardware configuration. We then began reverse engineering WinAPRS and fuzzing it for vulnerabilities using modified open-source software. Finally,…
Hacking Ham Radio: WinAPRS – Part 2
In part one of this series on vulnerability research in ham radio software, we discussed ham radio and digital communications via packet radio. We reviewed some relevant packet radio protocols…