Vulnerability Management – Just Do It!
Abilities Identify Security issues based on analysis of vulnerabilities – apply cybersecurity and privacy principles to organizational requirements Knowledge Application vulnerabilities, data backup and recovery, host/network access control mechanisms, system…
APC UPS (Power Supplies) 3 Critical Vulnerabilities
Do you have an APC UPS(Uninterruptible Power Supply)? (Image above from Armis Research) I do not know which devices actually have these vulnerabilities, assuming Armis research is correct then it…
Global Cyberwar: What Does That Look Like?
First we have to discuss – what is a “Global Cyberwar”? It has to do with the current conflict with Russia — Ukraine. In this image(Feb28 and Mar1) there is…
Can Small Businesses get Ransomware?
Unfortunately they can 1. Why Ransomware? because the ransomware attack software is out for everyone – it is easy to send attack emails to millions. 2. Most Attacks start with…
Hackers Are Ruthless: Attack Red Cross Red Crescent 500k stolen Info
From Brian Krebs’ KrebsonSecurity website: On Jan. 19, the ICRC disclosed the compromise of servers hosting the personal information of more than 500,000 people receiving services from the Red Cross…
