EXECUTIVE SUMMARY “Use cases are the core of security monitoring activities. A structured process to identify, prioritize, implement, and maintain use cases allows organizations to align...
Month: August 2022
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
INTRODUCTIONHaving a security operations center (SOC) is no longer a privilege of large organizations. With growing cyber attacks and a changing technology landscape, all companies are...
Microsoft Active Directory – Security Self Assesment Guide 2022 by Huy Kha
SummaryActive Directory is the backbone of identities for many organizations around the world, but it isoften not managed well, which open the doors for attackers to...
Cybersecurity Open Source Tools
Overview• Pillars of Cybersecurity• Cybersecurity Fundamentals• Introduction to Open Source Tools• What are they?• Overview of Key Players• Types of Open Source Tools• SWOT Analysis of...
#DEFCON: Electrovolt Exploits Against Electron Desktop Apps Exposed
#DEFCON: Electrovolt Exploits Against Electron Desktop Apps ExposedElectron-based desktop application including Discord, Microsoft Teams and VScode were at risk from a series of vulnerabilitiesLeer másElectron-based desktop...
New Attack Weaponizes PLCs to Hack Enterprise and OT Networks
New Attack Weaponizes PLCs to Hack Enterprise and OT NetworksThe research resulted in proof-of-concept exploits against seven market-leading automation firmsLeer másThe research resulted in proof-of-concept exploits...
Healthcare Provider Issues Warning After Tracking Pixels Leak Patient Data
Healthcare Provider Issues Warning After Tracking Pixels Leak Patient DataThe leak was caused by incorrect configurations of an online tracking tool from MetaLeer másThe leak was...
Two Additional Malicious Python Libraries Found on PyPI Repository
Two Additional Malicious Python Libraries Found on PyPI RepositoryThe new packages were masquerading as one of the most popular open-source packages on PyPILeer másThe new packages...
Bug Bounty Giant Slams Quality of Vendor Patching
Bug Bounty Giant Slams Quality of Vendor PatchingZero Day Initiative says incomplete or faulty patches now commonplaceLeer másZero Day Initiative says incomplete or faulty patches now...
USBs Still a Major OT Infection Vector
USBs Still a Major OT Infection VectorManufacturing was most exposed to OT threats in 2021Leer másManufacturing was most exposed to OT threats in 2021