PrintNightmare: A Critical Windows Print Spooler VulnerabilityOn June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows... BLOG The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... LIFARS expert at the Summer School of Cybercrime September 18, 2020 CSIRT-UPJS – a security team from the University of Pavol Jozef Šafárik in Košice, Slovakia has organized the third Summer School... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
PrintNightmare: A Critical Windows Print Spooler VulnerabilityOn June 30th, 2021 the CERT Coordination Center released VulNote for a critical remote code execution vulnerability in the Windows...
BLOG The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor.... CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project.... Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps... Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you... What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to... LIFARS expert at the Summer School of Cybercrime September 18, 2020 CSIRT-UPJS – a security team from the University of Pavol Jozef Šafárik in Košice, Slovakia has organized the third Summer School... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker... Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the... GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ... Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
The Current State of Zero-Day Exploit Market January 20, 2021 Zero-day or 0day vulnerability is a security weakness that is unknown and that has not been patched by the vendor....
CISA Urged Admins To Apply The Security Update To Patch Vulnerability In OpenSSL December 29, 2020 On December 8, 2020, OpenSSL issued a security update for a high severity DoS vulnerability that affects the open-source project....
Applying MITRE ATT&CK and Shield Frameworks in the Real-World December 8, 2020 The threat landscape has never been as diverse, and the bad news is that it’s continuously expanding and evolving. SecOps...
Types of SSL Certificates – Why Should You Care? November 20, 2020 Are you in a process of creating your own webpage or do you already have one or two? Then, you...
What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
CISA’s Patch by Tonight Emergency Directive October 6, 2020 The Cybersecurity and Infrastructure Security Agency (CISA) has published an Patch by Tonight emergency directive. It requires federal agencies to...
LIFARS expert at the Summer School of Cybercrime September 18, 2020 CSIRT-UPJS – a security team from the University of Pavol Jozef Šafárik in Košice, Slovakia has organized the third Summer School...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Mitigating Cyber Risk June 5, 2020 Cyber risk is commonly defined as exposure to harm or loss resulting from breaches or attacks on information systems. Every...
Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Mobile Threats in Today’s Landscape May 15, 2020 The Cyber Security Industry has seen more sophisticated attacks emerging after having their hands full with digital security with the...
GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ...
Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...