Posts

Zoom enacts security and privacy control to prevent Zoombombing

/
On April 5th, Zoom turned on the passwords and waiting room features for meetings by default aimed at users of their free version and those with a single license version to help prevent “Zoombombing”.

Kali 2020.1 Default Username & Password – kali kali

/
In Kali Linux 2020.1, both the default user and password will be “kali”

Intel Active Management Technology Multiple Vulnerabilities (INTEL-SA-00241)

/
Multiple potential security vulnerabilities in Intel Active Management Technology (Intel AMT) may allow escalation of privilege, information disclosure, and/or denial of service. Vulnerability Detection Result

Cybersecurity Maturity Model Certification (CMMC) Levels

/
The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive).

Understanding Cybersecurity Maturity Model Certification (CMMC)

/
So, if you haven’t heard or if you are not familiar with the cybersecurity maturity model certification (CMMC), don’t worry about it, we are here to explain it all to you.

Marriott Data Breach and What You Need to Know

/
Marriott International said its Starwood guest reservation database was breached, exposing the personal info of about 500 million customers.

A Book Review of “Learning Malware Analysis” by Monnappa KA

/
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.

Cyberwar Season 1 – Episode 3: Cyber Mercenaries

/
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.

Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr

/
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.

Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?

/
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.