Social Engineering Internal Testing Best Practises
Introduction Social engineering, namely the aim of threat actors to trick humans so as to gain access to IT infrastructure to install malware or steal important information, is still aRead More →
Information security specialist, currently working as risk infrastructure specialist & investigator.
15 years of experience in risk and control process, security audit support, business continuity design and support, workgroup management and information security standards.
Introduction Social engineering, namely the aim of threat actors to trick humans so as to gain access to IT infrastructure to install malware or steal important information, is still aRead More →
Zoom announced that it published an update (5.11.5) of its video call app that corrects a security flaw in its version for Mac computers. They explained that the vulnerability inRead More →
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques, and procedures (TTPs), including a new remote access Trojan called ROMCOM RAT on compromised systems.Read More →
The Cyber Security Agency of the United States (CISA) added to its catalog of vulnerabilities that are being actively exploited a recently discovered flaw in UnRAR. About the UnRAR vulnerabilityRead More →
On many occasions, security flaws appear that can compromise our devices. They can affect operating systems like Windows, applications, drivers. It is important to always correct them and prevent hackersRead More →
HP has highlighted a new wave of cybercriminals who spread families of ‘malware’ in business environments using files with shortcuts or links (so-called LNK) to distribute ‘malware’. It is oneRead More →
We can say that Kali Linux is one of the most important distributions in terms of computer security. Now they have released their new version, Kali Linux 2022.3, which bringsRead More →
Twilio Twilio has confirmed that hackers accessed customer data after successfully tricking employees into handing over their corporate login credentials. The San Francisco-based company, which allows users to embed voiceRead More →
Argo CD is a declarative GitOps continuous delivery tool for Kubernetes. It is required because Application definitions, configurations, and environments should be declarative and version controlled. Also it helps whenRead More →
A threat actor has leaked 4TB of confidential data from Cellebrite an Israeli digital intelligence company. Cellebrite is an Israeli company specialized in providing forensic tools to security forces andRead More →