cje

Media Packet

Casey Ellis, on the record.

959 items across 8 categories — press, stages, airwaves, and paperwork. Captured, displayed, and archived for posterity.

Press & Media

“Lawsuit alleges Roblox tracks children's data without parental consent”

securitymagazine.com

Press & Media

Lawsuit alleges Roblox tracks children's data without parental consent

Casey Ellis comments on a lawsuit against Roblox, framing it as a reminder of the "trust tax" companies pay when handling user data, particularly that of children. He notes the complexity of consent in digital environments and the potential for such lawsuits to set new precedents.

Security Magazine ·

Press & Media

“Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available Critical Cisco SMB Router Flaw Allows Authent…”

darkreading.com

Press & Media

Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available Critical Cisco SMB Router Flaw Allows Authentication Bypass, PoC Available

Details a critical authentication bypass vulnerability in Cisco small-to-medium business routers, for which proof-of-concept exploit code is publicly available.

Dark Reading ·

Patents

“Automated Prediction Of Cybersecurity Vulnerabilities”

patents.justia.com

Patents

Automated Prediction Of Cybersecurity Vulnerabilities

Techniques are disclosed for predicting cybersecurity vulnerabilities automatically in IT assets/targets based on known vulnerabilities of various available technologies/products. This is accomplished by loading and linking one or more ontologies in a graph database containing vulnerability information about the technologies. The assets/targets preferably belong to a bug-bounty program. An optional discovery tool maps the attack surface of each target. A profiler collects the various technologies or traits used by the target and links them to the target. Then the graph database is queried to predict the cybersecurity vulnerabilities associated with the traits and consequently with the targets. The system is preferably implemented with a service-oriented architecture (SOA) so feedback/predictions can be provided to the user in near/real-time.