Home Blog Page 52
Learning digital skills and gaining technical knowledge are essential in a rapidly changing digital world. People with no or minimal digital knowledge often fall victim to various online scams and frauds. To bring awareness to this digital literacy gap,...
An unpatched Windows 10 vulnerability has been exploited once again and the bounty shared on hacking forums. A security advisory from Redmond shares that the security hole CVE-2021-40444 affects the “MSHTML” component of Internet Explorer (IE) on Windows 10...
The Russian internet service provider Yandex admitted that it had sustained a Distributed Denial-of-Service (DDoS) attack that temporarily affected its operations. The attack is denominated as the largest DDoS attack in the history of the Russian Internet (RuNet). Security...
CrowdStrike has just released its annual report that confirms an explosion in adversary activity, both in volume and velocity. The CrowdStrike Falcon OverWatch annual report is titled, “Nowhere To Hide, 2021 Threat Hunting Report: Insights from the CrowdStrike Falcon...
IT and Security professionals with blue team security certifications can be part of an organization’s blue team and build defensive security measures. The blue team and the red team are an integral part of cybersecurity, and both the teams...
Network protocols are a set of pre-defined rules and guidelines that computer-related devices follow to enable network communication. These standard rules framework in the Internet protocol suite include identifying and establishing connections among devices. Moreover, they also define how...
The Office of Management and Budget (OMB) released a Federal Zero Trust Strategy to push federal agencies’ networks and systems to zero-trust security architecture. The Cybersecurity and Infrastructure Security Agency (CISA) also released its Cloud Security Technical Reference Architecture...
A previously patched Fortinet VPN vulnerability has again been exploited. The threat actor, identified as “Orange,” allegedly exploited the Fortinet CVE-2018-13379 vulnerability and leaked over 500,000 login credentials of the Fortinet VPN users on the dark web. VPNs are meant...
Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design recently revealed a group of security vulnerabilities, tracked as BrakTooth, in the Bluetooth Classic (BR/EDR)...
When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the government has traditionally defended the network perimeter with tools like firewalls and antivirus software. Unfortunately,...