Attack Life Cycle Changed By Cloud
Great video from BSides Columbus Ohio 2018 : “Zero to Owned in 1 Hour” That is an interesting review of how the new potential weaknesses are in the Cloud itself.…
CyberAttacks More Sophisticated
The attackers are getting better, they are not sitting still. If you are hoping no one will notice you in your personal world … not likely, everyone is a target.…
Artificial Intelligence Cybersecurity
We as Cybersecurity practitioners must use the best tools we can find. So if AI(Artificial Intelligence) can help us we need to use them. Of course we have to use…
Test your network by Bloodhound
Which Bloodhound might you ask? No not the Dog… But the following program in Kali Linux: Just a slightly different picture and meaning. Cobaltstrike has tested with it and this…
Trust Issues in Security
Who do I trust when dealing in Security? (definition of ‘trust’ from Google) First impressions count – remember what everyone says… But Wall Street Journal story “The Mistakes You Make…
