How are Hackers Always a Step Ahead of Defense?
So the Defense (also known as Blue team) has been inundated with spam, the goal of the spam(for the hackers) is for an unsuspecting user to give up their credentials(username…
Defend Your Systems
So the Defense (also known as Blue team) has been inundated with spam, the goal of the spam(for the hackers) is for an unsuspecting user to give up their credentials(username…
An interesting video from RSA Conference 2018: “There’s no such Thing as a Cyber-risk” So if you look at possible risk domains Computer Security (or Cybersecurity is not on there.…
We say things like: DO NOT CLICK ON Phishing emails!! But then Equifax creates www.experianidentityservice.co.uk ??? or creditexpert.co.uk/login/login Bsides in London earlier this year had a presentation by Meadow Ellis…
Area41 Defconswitzerland had an interesting video about attacking Single Sign-on technology SAML – Security Assertion Markup Language (basic tutorial on SAML) There are a few ways an attack can happen,…
Let’s set this up… You have paid attention to some Cyber security efforts, and have a number of defenses, maybe not “all of them” but your risk management matrix has…