Should we have a non-COVID-19 hacking code?

Can We Have A Non-COVID-19 Hacking Code?

SARS-CoV2, the virus behind the COVID-19 pandemic, isn’t the only pathogen that’s been spreading around the world lately. It has spawned a corresponding slew of cyber attacks. Unlike many other cyber actions targeting areas like finance and manufacturing, though, these ones could cost lives. Isn’t there an ethical code for attackers during a global crisis […]

Read more
Harnessing hacker talent early yields promising results

Harnessing Hacker Talent Early Yields Promising Results

Many parents are struggling to keep their teens engaged and busy while home from school during the COVID-19 health crisis. For some young people in the UK, help is at hand thanks to a program from the UK government. Law enforcement and government cybersecurity officials have launched a program called Virtual Cyber School, which aims […]

Read more

Despite COVID-19, experts warn against online voting

With over 450,000 COVID-19 cases in the US at the time of writing, thoughts are turning to the election in November. If the health crisis hasn’t abated by then, how will the US vote? The US electoral system is fragmented, with states and counties handling the voting process according to their own rules. Wisconsin went […]

Read more
Inside the Shadowserver crisis

Inside the Shadowserver Crisis

This week hasn’t been the best for the Shadowserver Foundation. The nonprofit is fighting for its life after its main US sponsor pulled the plug. How did we get here, what does this mean for the internet, and what’s next? Shadowserver began in 2004 as a purely voluntary initiative started by Nicholas Albright. Furious to […]

Read more

SecTor 2020 and COVID-19

The situation surrounding COVID-19 continues to develop quickly. In the 24 hours preceding this post we’ve seen travel from the United States to mainland Europe discontinued. Schools in the Toronto area are not returning until at least April 5 and large gatherings are either being discouraged or disallowed depending on the region. We remain optimistic […]

Read more
What exposed docker registries tell us about cloud deployments

What Exposed Docker Registries Tell Us About Cloud Deployments

If you’ve delved into cloud technologies at all, you’ve probably run across the concept of containers. They promise to streamline your software developments, but they come with their own dark lining. This week, Palo Alto Networks’ Unit 42 research team published some shocking security research about container registries that should give us pause about how […]

Read more
a trying time for US election security

A Trying Time for US Election Cybersecurity

With less than a year to go until America chooses its next president, its election security needs some work. Last week, Mick Baccio, the CISO for democratic candidate Pete Buttigieg, quit the campaign. He cited “a fundamental philosophical difference with campaign management regarding the architecture and scope of the information security program.” This leaves democrats […]

Read more
Passing a standard for bug reporting

Security.txt: A Standard Signpost For Ethical Hackers

A proposal that makes it easier to submit bug reports is close to getting the final stamp of approval – but even when it does, there’s still a lot of work to do. Edwin Foudil first submitted security.txt as an Internet Draft to the Internet Engineering Task Force in September 2017. It’s a format for […]

Read more

Contest Solution Revealed

At SecTor 2019 we ran another exciting Capture the Flag (CTF) contest with something for everyone, from novices to experts alike. With a special thanks to Dolos Group for setting up and running the CTF, and Nuix for their support, it was one of the best we’ve seen to date. Congratulations to all who participated, […]

Read more

SecTor 2020 Plans Begin!

When we founded SecTor, we did it because we were regular attendees of Black Hat, Defcon and several other US based events and we were frustrated that Canada had nothing of the sort. We started SecTor both to bring the best and most important security researchers from around the world to Canada, and to showcase […]

Read more

How To Get The Most From Your First Cybersecurity Conference

When it comes to cybersecurity conferences, DEF CON is one of the most daunting. It’s huge, busy, and filled with experts, many of whom already know each other. So when Laylee Olsen ventured there for the first time, she was understandably a little nervous. It was the first ever cybersecurity conference for 30-year-old Olsen, a […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!