Anonymous In a Hacking Rampage Against RussiaLess than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets... BLOG Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker.... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Anonymous In a Hacking Rampage Against RussiaLess than a week after announcing a cyber offensive against Russia, Anonymous has attacked over 300 Russian targets. So far, the targets...
BLOG Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker.... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Crypto.com Admits $35 Million Hack January 27, 2022 A massive crypto attack occurred on January 17, affecting 483 users of Crypto.com – one of the most ambitious cryptocurrency...
OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
Can Cars Get Hacked? July 3, 2020 The demand for connected-cars has been rising and most of the connected-cars have been sold to customers. A connected car...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in...
What You Should Know About Cryptojacking June 2, 2020 Cryptojacking is a notorious method of tricking the victim to perform the crime of mining the cryptocurrency for the attacker....
Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...