Search Results for: network Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters... Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response... Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau... Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become... Blog Post Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that... Blog Post Hackbits Powered by LIFARS – Episode 7: Cybersecurity Spotlight November 11, 2021 It was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated... Blog Post Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021 Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect... Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters...
Blog Post New but Odd BlackByte Ransomware Reusing Crypto Keys and Worms into Networks November 16, 2021 A cybersecurity firm named Trustwave has recently found a new but odd form of ransomware during its recent incident response...
Blog Post FBI Warns of Conti Ransomware Attacks on U.S. Healthcare Networks June 29, 2021 At least 16 Conti ransomware attacks on U.S. healthcare and first responder networks have been identified by the Federal Bureau...
Blog Post Attackers Exploiting Companies That Use Advanced VPNs November 19, 2021 Virtual Private Networks (VPNs) have long been an essential part in the operation of modern businesses. They have recently become...
Blog Post Increasing Visibility to Find Signs of Reconnaissance and Lateral Movement July 23, 2021 Establishing an ATP (advanced persistent threat) has long been the goal of cyberattacks. By remaining undetected in the target environment,...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post Importance of PVLAN and Alternative Solutions April 16, 2021 Security officers and network administrators today are sitting between a rock and a hard place. At the same time that...
Blog Post Hackbits Powered by LIFARS – Episode 7: Cybersecurity Spotlight November 11, 2021 It was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated...
Blog Post Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021
Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
Blog Post Collecting and Analyzing NetFlow for Incident Response May 7, 2021 As with any type of cybersecurity incident, you can only respond against a threat if you are able to detect...
Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...