Skip to content
Glock Enterprises
  • Welcome
  • Blog
  • Resources
  • Support

usenix

Meet Bluetana, the Scourge of Pump Skimmers

14th August 201914th August 2019 peterglock

“Bluetana,” a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations […]

 Brian Krebs, usenix  Glock Takes Stock

Recent Posts

  • New Linux, macOS malware hidden in fake Browserify NPM package
  • Capcom: Ransomware gang used old VPN device to breach the network
  • The Locked Shields exercise will place as much focus on grey zone activities as it will on the …
  • FBI nuked web shells from hacked Exchange Servers without telling owners
  • Microsoft Patch Tuesday, April 2021 Edition

Get in touch

Email: [email protected]


View Glock Enterprises Ltd profile on Ariba Discovery

Data Protection Register

Registered with the ICO: ZA494319

About

Glock Enterprises Ltd. Registered in England & Wales No. 11183883

VAT No: GB 361 2795 89

Glock Enterprises (Europe) OÜ
Registered in Estonia
No. 16149069

VAT No: EE102351110

All content (c) Glock Enterprises Ltd 2021

Pages

  • Blog
  • Privacy Policy
  • Resources
    • Free Trial – Private Threat Intelligence
    • White Paper: Building a Business Case for Cybersecurity Asset Management
    • White Paper: Cyber Deception – Migrating to an alternative platform
    • White Paper: Hunting for Threats in Operational Technology
    • White Paper: Internet Connected Storage
    • Whitepaper: 5 Steps to Building a Threat Modelling Program for AWS
    • Whitepaper: Coping with a flood of Data Subject Access Requests
  • Services
  • Support
  • Welcome

The Latest from Facebook

Glock Enterprises Ltd

12 hours ago

Glock Enterprises Ltd
buff.ly/3a8DektCapcom: Ransomware gang used old VPN device to breach the networkDo you include your backup facilities in your threat modelling and pen test exercises?...:Capcom has released a new update about the ransomware attack it suffered last year, detailing how the hackers gained access to the network, compromised devices, and stole personal information belonging to thousands of individuals.[...]Investigators discovered that Ragnar Locker operators gained access to Capcom’s internal network by targeting an old VPN backup device located at the company’s North American subsidiary in California.[...]Original Article ... See MoreSee Less

Photo

View on Facebook
· Share

Share on Facebook Share on Twitter Share on Linked In Share by Email

Proudly powered by WordPress | Theme: Moesia by aThemes