IT and Security professionals with blue team security certifications can be part of an organization’s blue team and build defensive security measures. The blue team and the red team are an integral part of cybersecurity, and both the teams...
Network protocols are a set of pre-defined rules and guidelines that computer-related devices follow to enable network communication. These standard rules framework in the Internet protocol suite include identifying and establishing connections among devices. Moreover, they also define how...
The Office of Management and Budget (OMB) released a Federal Zero Trust Strategy to push federal agencies’ networks and systems to zero-trust security architecture. The Cybersecurity and Infrastructure Security Agency (CISA) also released its Cloud Security Technical Reference Architecture...
A previously patched Fortinet VPN vulnerability has again been exploited. The threat actor, identified as “Orange,” allegedly exploited the Fortinet CVE-2018-13379 vulnerability and leaked over 500,000 login credentials of the Fortinet VPN users on the dark web.
VPNs are meant...
Bluetooth technology (BT) has encountered severe scrutiny due to various design flaws and vulnerabilities. Security experts from the Singapore University of Technology and Design recently revealed a group of security vulnerabilities, tracked as BrakTooth, in the Bluetooth Classic (BR/EDR)...
When it comes to cybersecurity, the federal government is putting out fires every day — and it can be exhausting. Like most organizations, the government has traditionally defended the network perimeter with tools like firewalls and antivirus software. Unfortunately,...
Researchers uncovered active exploitation of a zero-day remote code execution vulnerability in the main HTML component of the now-discontinued Internet Explorer browser. Microsoft warned that unknown hackers are exploiting the vulnerability tracked as CVE-2021-40444 to compromise vulnerable Windows systems...
Most news on ransomware attacks is about U.S. organizations. We hear little about ransomware attacks in India, as few organizations report it. That’s not to say that Indian companies are spared. In fact, India is the fifth most attacked...
It seems like New Zealand is becoming a new cyberthreat landscape with regular security incidents. Months after a cyberattack on the New Zealand reserve bank, attackers reportedly targeted several banks, financial institutions, and postal services in the country.
CERT NZ...
When we think of cybersecurity our mind automatically goes to powerful software protecting “soft” assets i.e. data that could range from massive enterprise-grade datastores to tiny files that contain sensitive data about someone.
By Neil Okikiolu, Founder/CEO of Simius Technologies Inc.
These “soft” assets have been...














