Vulnerability Management – Just Do It!

Abilities Identify Security issues based on analysis of vulnerabilities – apply cybersecurity and privacy principles to organizational requirements Knowledge Application vulnerabilities, data backup and recovery, host/network access control mechanisms, system administration, network, and operating system hardening techniques. Skills Detecting host and network intrusions Conduct vulnerability scans and recognize vulnerabilities in security systems. Tasks Keep up … Read more

APC UPS (Power Supplies) 3 Critical Vulnerabilities

Do you have an APC UPS(Uninterruptible Power Supply)? (Image above from Armis Research) I do not know which devices actually have these vulnerabilities, assuming Armis research is correct then it may be all devices that connect to the cloud. Armis Research found some vulnerabilities: Armis has discovered a set of three critical vulnerabilities in APC … Read more

Global Cyberwar: What Does That Look Like?

First we have to discuss – what is a “Global Cyberwar”? It has to do with the current conflict with Russia — Ukraine. In this image(Feb28 and Mar1) there is some interesting information which is from SecurityWeek magazine : The groups and what country they support (Ukraine, UNK (Unknown?), or Russia).  Where they will congregate … Read more

Can Small Businesses get Ransomware?

Unfortunately they can 1. Why Ransomware? because the ransomware attack software is out for everyone – it is easy to send attack emails to millions. 2. Most Attacks start with phishing emails. 3 Have you updated your systems? Also called patched your systems? every month Microsoft and other vendors release fixes to their software which … Read more

Hackers Are Ruthless: Attack Red Cross Red Crescent 500k stolen Info

From Brian Krebs’ KrebsonSecurity  website: On Jan. 19, the ICRC disclosed the compromise of servers hosting the personal information of more than 500,000 people receiving services from the Red Cross and Red Crescent Movement. The ICRC said the hacked servers contained data relating to the organization’s Restoring Family Links services, which works to reconnect people … Read more