New ISO 27002:2022. The Swiss Army Knife of Security
They have kept us in suspense for a long time, but they finally published it in February of this year. The new version of the ISO 27002 international standard representsRead More →
Data Security News | Infosec Blog | Information Security Tutorials
They have kept us in suspense for a long time, but they finally published it in February of this year. The new version of the ISO 27002 international standard representsRead More →
SpaceX has opened the door for investigative hackers to hack into Starlink, its satellite internet network. The company has also added that it could pay them up to $25,000 (24,654.88Read More →
We can say that Kali Linux is one of the most important distributions in terms of computer security. Now they have released their new version, Kali Linux 2022.3, which bringsRead More →
Details and screenshots of a version of the Pegasus spyware software designed for Israeli police were leaked. This spyware was referred to by police by a different name: Seifan. TheRead More →
North Koreans hackers are faking linkedin profiles and CVs and pretending to be cryptocurrency experts for getting full time or freelance remote work at cryptocurrency firms according to Bloomberg. SomeRead More →
It is well known that the volume of security incidents has not stopped growing steadily for some years now. The cybercrime industry is experiencing a golden age that, unfortunately, showsRead More →
Microsoft has chosen to add specific security measures against brute force attacks against RDP (Remote Desktop Protocol). These security improvements have been introduced in the most recent builds of WindowsRead More →
One of the attack methods that hackers can use is a simple Word document that they send in the mail. They use macros that are capable of executing the maliciousRead More →
Microsoft revealed on Tuesday that a large-scale phishing campaign targeted more than 10,000 organizations since September 2021 by attacking the Office 365 authentication process even on accounts secured with multi-factorRead More →
Cyber Security researchers at the Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, Israel, have discovered a new technique called “SATAn”. The new method allows stealingRead More →