UK Police Trying to Stop Worrying Increase of Child HackersUK police are investigating and deploying possible solutions to a concerning trend of an increasing number of young individuals showing... BLOG State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark... Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
UK Police Trying to Stop Worrying Increase of Child HackersUK police are investigating and deploying possible solutions to a concerning trend of an increasing number of young individuals showing...
BLOG State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish... DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark... Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
State Department Finally Nails Down Plan for New Cyber Bureau December 7, 2021 After constant delays going back over the last two years, the State Department has finally unveiled its plans to establish...
DOJ & Europol Arrest 150 in Disruption of DarkNet Drug Operation November 24, 2021 International cybercrime sting operation leads to the seizure of weapons, drugs, and $31 million from DarkNet opioid traffickers. Operation Dark...
Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to...
What is XSS? Concerned User’s Guide to Cross-Site Scripting July 30, 2020 Cross-site scripting is one of the prominent nightmares of every security-conscious web application developer. The term was coined twenty years...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
The Importance of An Information Systems Audit June 9, 2020 While enterprises’ reliance on IT systems continues to increase, IT systems are facing an increasing variety of threats. In the...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...