Social Engineering Internal Testing Best Practises
Introduction Social engineering, namely the aim of threat actors to trick humans so as to gain access to IT infrastructure to install malware or steal important information, is still aRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
Introduction Social engineering, namely the aim of threat actors to trick humans so as to gain access to IT infrastructure to install malware or steal important information, is still aRead More →
Zoom announced that it published an update (5.11.5) of its video call app that corrects a security flaw in its version for Mac computers. They explained that the vulnerability inRead More →
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques, and procedures (TTPs), including a new remote access Trojan called ROMCOM RAT on compromised systems.Read More →
The Cyber Security Agency of the United States (CISA) added to its catalog of vulnerabilities that are being actively exploited a recently discovered flaw in UnRAR. About the UnRAR vulnerabilityRead More →
On many occasions, security flaws appear that can compromise our devices. They can affect operating systems like Windows, applications, drivers. It is important to always correct them and prevent hackersRead More →
HP has highlighted a new wave of cybercriminals who spread families of ‘malware’ in business environments using files with shortcuts or links (so-called LNK) to distribute ‘malware’. It is oneRead More →
We can say that Kali Linux is one of the most important distributions in terms of computer security. Now they have released their new version, Kali Linux 2022.3, which bringsRead More →
Twilio Twilio has confirmed that hackers accessed customer data after successfully tricking employees into handing over their corporate login credentials. The San Francisco-based company, which allows users to embed voiceRead More →
Argo CD is a declarative GitOps continuous delivery tool for Kubernetes. It is required because Application definitions, configurations, and environments should be declarative and version controlled. Also it helps whenRead More →
A threat actor has leaked 4TB of confidential data from Cellebrite an Israeli digital intelligence company. Cellebrite is an Israeli company specialized in providing forensic tools to security forces andRead More →
Details and screenshots of a version of the Pegasus spyware software designed for Israeli police were leaked. This spyware was referred to by police by a different name: Seifan. TheRead More →
3 vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an unauthenticated threat actor to remotely execute arbitrary code or cause a denial of serviceRead More →
North Koreans hackers are faking linkedin profiles and CVs and pretending to be cryptocurrency experts for getting full time or freelance remote work at cryptocurrency firms according to Bloomberg. SomeRead More →
Hackers are constantly looking for new ways to attack and infect PC users. And, for this, there is nothing better than taking advantage of the programs or services that areRead More →
The manufacturer NETGEAR has issued an urgent notice for all owners of professional VPN and firewall routers, the affected models are the BR200 and BR500, two models widely used byRead More →
In this article, we will consider how to change (change, spoof) the MAC address on your Linux computer, as well as how to use different tools for the automatic replacementRead More →
It is well known that the volume of security incidents has not stopped growing steadily for some years now. The cybercrime industry is experiencing a golden age that, unfortunately, showsRead More →
IBM has published details of vulnerabilities affecting IBM QRadar SIEM. Below are the details. 1) Improper input validation CVE-ID: CVE-2017-9801 Description The vulnerability allows a remote attacker to inject arbitraryRead More →
SonicWall has published a hotpatch to fix two SQL injection vulnerabilities impacting the GMS (Global Management System) and Analytics On-Prem products. CVE-2022-22280 is a critical vulnerability (CVSS 9.4) that resultsRead More →
Microsoft revealed on Tuesday that a large-scale phishing campaign targeted more than 10,000 organizations since September 2021 by attacking the Office 365 authentication process even on accounts secured with multi-factorRead More →