greybrimstone

About Adriel Desautels

This author has not yet filled in any details.
So far Adriel Desautels has created 6 blog entries.

AI Series Part 2: Social Media and the Rise of “Echo Chambers”

By |2021-04-15T16:24:18-04:00April 15th, 2021|

This is the second post in a series discussing AI and its impacts on modern life. In this article, we’ll explore how AI is used in social media and the ramifications of training AI while defining “success” based upon the “wrong” metrics. Social Media Is [...]

AI Series Part 1: Introduction to the Modern Threats of AI

By |2021-04-15T15:04:23-04:00March 3rd, 2021|

This is the first post in a series discussing AI and its impacts on modern life. Artificial Intelligence is useful, powerful, and dangerous when used irresponsibly. Its being leveraged by a wide variety of industries including but not limited to social media, defense contractors and [...]

Embedded Device Security Research: AXON Body 2 – Body Worn Cameras

By |2021-01-18T21:48:15-05:00January 15th, 2021|

Introduction Netragard performs regular vulnerability research against software and hardware. While most of this research is customer confidential, some of the research is intended for disclosure. The focus of our research for this article was the AXON Body 2 Worn Camera which plays a critical [...]

SolarWinds, SOX, and Corporate Responsibility for Cybersecurity

By |2021-01-13T19:27:49-05:00January 13th, 2021|

By now, most everyone has heard of the SolarWinds breach. Cybercriminals took advantage of SolarWinds’ poor cybersecurity practices to gain access to their network and implant malicious code within updates to their Orion network monitoring solution. This Orion solution is widely used, and its compromise [...]

The Security Risks Behind Voting Machines & Mail-in Ballots

By |2020-10-27T17:29:35-04:00October 27th, 2020|

In recent months, the security of absentee voting, widely used due to the threat of the COVID-19 pandemic, has been called into question. But are these processes any less secure than the electronic voting systems used on a “normal” election day? Introduction to Electronic Voting System [...]

Inside the 2020 Ping of Death Vulnerability

By |2020-10-14T21:05:39-04:00October 14th, 2020|

What is the 2020 Ping of Death? Ping of Death vulnerabilities are nothing new. These vulnerabilities arise from issues in memory allocation in the TCP/IP stack. If memory is improperly allocated and managed, a buffer overflow vulnerability can be created that leaves the application vulnerable [...]