6 open-source tools to assess and enhance corporate defenses

Here’s how the blue team wards off red teamers and a few open-source tools it may leverage to identify chinks in the corporate armor. Do you ever play computer games such as Halo or Gears of War? If so, you’ve definitely noticed a game mode called Capture the Flag that pits two teams against each other – … More 6 open-source tools to assess and enhance corporate defenses

Vulnerabilities in business VPNs under the spotlight

As adversaries increasingly set their sights on vulnerable enterprise VPN software to infiltrate corporate networks, concerns mount about VPNs themselves being a source of cyber risk. Virtual Private Network (VPN) services have emerged as essential tools for modern businesses in recent years, doubly so since helping save the day for many of them amid the pandemic-fueled, pell-mell rush … More Vulnerabilities in business VPNs under the spotlight

Keeping encryption secure from BitLocker sniffing

Recently, the YouTube channel stacksmashing uploaded a video on breaking the built-in encryption in Windows, essentially bypassing Windows Disk Encryption on most devices using Microsoft’s globally dominant operating system with a cheap $10 tool. This all in just 43 seconds – record time. And while encryption has often been the poster child for efficient and secure data protection, now … More Keeping encryption secure from BitLocker sniffing

Everything you need to know about IP grabbers

You would never give your personal ID to random strangers, right? So why provide the ID of your computer? Unsuspecting users beware, IP grabbers do not ask for your permission. A common message that any user of a social platform like Discord might see sometimes are warnings about IP grabbers being included as links in … More Everything you need to know about IP grabbers

A guide to online threats faced by kids over the last 30 years

Unfortunately, the threats have only gotten more sophisticated and easier to come by. Have a look at some that shaped the face of cyberspace today. Over the past three decades, the evolution of the internet has reshaped the way children explore, learn, and connect with the world. As this digital landscape has expanded, so too … More A guide to online threats faced by kids over the last 30 years