22Apr
20Jul
Train your Threat Hunting Skills
Train your Threat Hunting Skills One of my best friends, my partner in conferences, books, family friend Milad Aslaner wrote a great PowerShell simulation which can help you train your Threat Hunting skills. The good news is its completley FREE , below are the details and...
08Jul
Free Internet Security Threat Report by Symantec 2019
Free Internet Security Threat Report Formjacking. Targeted Attacks. Living off the Land. Coming for Your Business. Symantec’s 2019 Internet Security Threat Report takes a deep dive into insights from the world’s largest civilian global intelligence network, revealing: Formjacking attacks skyrocketed, with an average of 4,800 websites compromised each...
19Jun
Virus Bulletin : Lazarus Group a mahjong game played with different sets 0f tiles
Lazarus Group a mahjong game played with different sets of tiles Please go ahead and click the link below to read the full article . Below is a summary for the ones who want see what's in the article : https://www.virusbulletin.com/virusbulletin/2019/06/vb2018-paper-lazarus-group-mahjong-game-played-different-sets-tiles/#ref25 The number of incidents attributed to the...
06Jun
Apple and Privacy
Apple and Privacy Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do...
22May
New Windows 10 Security Exploit Can Read All Your Files – What You Need To Know
New Windows 10 Security Exploit A security researcher with a history of releasing zero-day exploits for the Windows operating system has struck again; this time just days after the latest Patch Tuesday security updates were rolled out. Which means that it’s unlikely there will be a...
08May
Verizon Data Breach Investigations Report 2019
Verizon Data Breach Investigations Report Understanding the threats can help you manage risk effectively. The threats are real, the attackers motivated. But something standsbetween them and your organization's data: you and your securityteams, with the insight, perspective, and tools to take action. You'll find that all right...
04Mar
Acunetix Web Application Vulnerability Report 2019 – Free download
Acunetix compiles an annual web application vulnerability report in order to provide security experts and interested parties with an analysis of data on vulnerabilities gathered over the previous year. The 2019 report contains the results and analysis of vulnerabilities, detected from the automated web and network...
27May
Why researching IT Security?
Why researching IT Security There is nearly every week an IT Security incident, more and more corporations and individuals are getting hit by Cyber Criminals. Based on commercial Kaspersky Security Bulletin (Kaspersky Security Bulletin, 2017) and Symantec Security report (Symantec Internet Security Threat Report ) the number of IT-related attacks are increasing...
17May