6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor. Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the Flag that pits two teams against each other – … More 6 open-source tools to assess and enhance corporate defenses

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk. Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for many of them amid the pandemic-fueled, pell-mell rush … More Vulnerabilities in business VPNs under the spotlight

Keeping encryption secure from BitLocker sniffing

Recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk Encryption on most devices using Microsoft’s globally dominant operating system with a cheap $10 tool. This all in just 43 seconds – record time. And while encryption has often been the poster child for efficient and secure data protection, now … More Keeping encryption secure from BitLocker sniffing

10 things to avoid posting on social media – and why

Do you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk. Hundreds of millions of us log on to our favorite social media sites every day. We shop, share photos and news, like posts and comments, send private messages, and much … More 10 things to avoid posting on social media – and why

Should we be prepared for AI-based critical infrastructure attacks?

AI may change the threat landscape essentially in three ways: expanding existing threats, ushering in new threats, and shifting the nature of threats as we know it. Of specific concern is the potential for cyberattacks on critical infrastructure to become more widespread. Critical infrastructure, usually considered to include power generation and electrical grid, hospitals and … More Should we be prepared for AI-based critical infrastructure attacks?