Zerologon – hacking Windows servers with a bunch of zeros – Naked Security

The big, bad bug of the week is called Zerologon. As you can probably tell from the name, it involves Windows – everyone else talks about logging in, but on Windows you’ve always very definitely logged on – and it is an authentication bypass, because it lets you get away with using a zero-length password. […]

Three Ways to Tighter Protection Against Cyber Security Attacks

A conscious ransomware that is smart enough to position itself to attack a computer at its preferred schedule is possible in the foreseeable future. Some of current tried and tested methods to maintain cybersecurity against unwanted attacks include protecting a device using back ups, disabling popups, and expending a reliable antivirus software. However, some may […]

Cleanup from Saint John cyberattack could last months, says cyber security expert | CBC News

A cyberattack on a municipality never comes at a good time, but a cyber security expert says the attack on Saint John’s internet infrastructure comes at a particularly bad time. On Sunday, the city announced there’d been a “significant” cyberattack, which forced it to shut down several online services, including payment systems, email and the city’s website. […]

CODA Footprint: changing the way small businesses think about cyber security – Roca X

We live in an age of increasing connectivity, with billions of devices connected to the internet at any given time, storing everything from business communication, financial details, and customer profiles to photos of our doggos and children. This interconnectivity brings both opportunities and risks. Today, hackers can easily purchase malware (harmful software) on the black […]

Indian Cyber-Security Chief presents DG ISPR as a model to follow

India’s cybersecurity chief, Lt Gen (retd) Rajesh Pant has praised the Inter-Services Public Relations and director-general of ISPR, Maj Gen Asif Ghafoor’s leading role in information warfare against India. Major Gen Asif Ghafoor (@OfficialDGISPR @peaceforchange ) giving sleepless nights to #IndianArmy as well😉“It is important to clarify what the three services of #Indian armed forces […]

Gautam Kumawat, 22 | Cyber Crime Investigator | Cyber Security Expert’s Success Story

Please Introduce yourself. [All About Gautam Kumawat] Hi, I’m Gautam Kumawat,  a 22 years old self made millionaire, Cyber crime Investigator and Cyber security Expert who hails from a small village near Pilani, Rajasthan. Till 5th standard, I studied in a government owned primary school situated in my village. Being a smart and curious kid, […]

D3 Security Wins Cyber Defense Magazine InfoSec Award and ISPG Global Excellence Award – D3 Security – D3 Security

Vancouver, British Columbia – D3 Security, an innovator in Security Orchestration, Automation and Response (SOAR) technology, today announced its D3 SOAR platform has been named a winner in both the 2019 Cyber Defense Magazine InfoSec Awards and the 15th Annual Info Security Products Guide’s Global Excellence Awards®. D3 SOAR took home the Editor’s Choice Award […]

Beware the spy in your baby monitor and smart camera as security chiefs warn cyber-crooks hack them | Daily Mail Online

Baby monitors and smart cameras are being HACKED by burglars and used to spy on victims’ homes and families, cyber chiefs warn Published: 00:00 GMT, 3 March 2020 | Updated: 02:49 GMT, 3 March 2020 Baby monitors and smart security cameras used in homes risk being hacked by cyber criminals, security chiefs warn today. They […]

How Azure Security Center automates the detection of cyber attack

Earlier this year, Greg Cottingham wrote a great article breaking down an example of an Azure Security Center detected attack against SQL Server. In this post, we’ll go into more detail on the way that security center analyzes data at-scale to detect these types of attacks, and how the output from these approaches can be […]

Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity | CISA

Through the operation of the National Cybersecurity Protection System (NCPS) and by fulfilling its mission as the national risk advisor, CISA has observed Chinese MSS-affiliated cyber threat actors operating from the People’s Republic of China using commercially available information sources and open-source exploitation tools to target U.S. Government agency networks. According to a recent U.S. […]