https://i1.wp.com/www.securityorb.com/wp-content/uploads/2020/04/iStock-1172295137.jpg?fit=1199%2C800&ssl=1 800 1199 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2020-04-06 12:52:352020-09-21 23:02:47Zoom enacts security and privacy control to prevent Zoombombing
On April 5th, Zoom turned on the passwords and waiting room features for meetings by default aimed at users of their free version and those with a single license version to help prevent “Zoombombing”.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2020/02/kali-2020.1.png?fit=798%2C284&ssl=1 284 798 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2020-02-01 17:19:252020-02-14 15:26:56Kali 2020.1 Default Username & Password – kali kali
In Kali Linux 2020.1, both the default user and password will be “kali”
https://i1.wp.com/www.securityorb.com/wp-content/uploads/2020/01/intel.jpg?fit=780%2C408&ssl=1 408 780 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2020-01-13 15:43:402020-09-21 23:03:25Intel Active Management Technology Multiple Vulnerabilities (INTEL-SA-00241)
Multiple potential security vulnerabilities in Intel Active Management Technology (Intel AMT) may allow escalation of privilege, information disclosure, and/or denial of service. Vulnerability Detection Result
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2020/01/CMMC.jpg?fit=600%2C402&ssl=1 402 600 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2020-01-10 16:05:352020-09-22 14:11:54Cybersecurity Maturity Model Certification (CMMC) Levels
The CMMC model has five defined levels, each with a set of supporting practices and processes. Practices range from Level 1 (basic cyber hygiene) and to Level 5 (advance/progressive).
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2020/01/CMMC.jpg?fit=600%2C402&ssl=1 402 600 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2020-01-03 18:44:102020-02-19 15:34:27Understanding Cybersecurity Maturity Model Certification (CMMC)
So, if you haven’t heard or if you are not familiar with the cybersecurity maturity model certification (CMMC), don’t worry about it, we are here to explain it all to you.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/12/181130-marriott-sign-cs-336p_8b65d3ef624b9ccb1eea67c59850f890.fit-760w.jpg?fit=760%2C457&ssl=1 457 760 hansb https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png hansb2018-12-05 22:16:592020-09-22 14:12:09Marriott Data Breach and What You Need to Know
Marriott International said its Starwood guest reservation database was breached, exposing the personal info of about 500 million customers.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/10/LMA2.png?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-10-01 00:51:182020-09-21 23:04:24A Book Review of “Learning Malware Analysis” by Monnappa KA
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2018/09/CM.jpg?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-09-10 15:19:162020-09-21 23:04:41Cyberwar Season 1 – Episode 3: Cyber Mercenaries
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/08/PCI4.jpg?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-08-31 12:55:592020-09-21 23:02:17Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2018/07/anonymous-logo.jpg?fit=625%2C400&ssl=1 400 625 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-07-31 12:29:272020-09-21 23:01:30Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.