Search Results for: insecure networks Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and... Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post Reformed Convicted Hacker Opens Up in Reddit AMA January 10, 2022 Daniel Kelley, a reformed British computer hacker who committed over £70,000,000 in damages, has decided to share his story and... Blog Post FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances.... Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find... Blog Post How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding... Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their... Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of...
Blog Post What is Penetration Testing? January 29, 2020 Penetration testing is a type of security testing that evaluates an organization’s ability to protect its application, network, system, and...
Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Reformed Convicted Hacker Opens Up in Reddit AMA January 10, 2022 Daniel Kelley, a reformed British computer hacker who committed over £70,000,000 in damages, has decided to share his story and...
Blog Post FBI: Cyber Threat Actors Stole Source Code From US Government Agencies And Private Companies November 25, 2020 The FBI (Federal Bureau of Investigation) has sent out a security warning on October 14, 2020, regarding insecure SonarQube instances....
Blog Post Enterprise Data Storage Environments Riddled With Vulnerabilities November 12, 2021 In The State of Storage Security Report, researchers from Continuity exposed the dangerous predicament organizations with enterprise storage systems find...
Blog Post How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post VPN Bugs and RDP – Top Exploits Used by Ransomware Gangs September 17, 2020 This year, more cybercrime gangs and ransomware attacks have been witnessed on companies spanning multiple industries. Cybercriminals are always finding...
Blog Post What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
Blog Post Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Blog Post U.S. DoJ Charges Two Chinese Hackers for Stealing COVID-19 Research and Trade Secrets August 3, 2020 This past week, the U.S. Department of Justice (DoJ) revealed charges against two Chinese nationals. These charges related to their...
Blog Post Mobile Security Issues Affecting Organizations March 25, 2020 Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of...