Cyber Security Awareness and Vulnerabilities Blog

ransomware1920x744.png

In 1989, the first instance of ransomware was delivered to thousands of people on floppy disks and demanded that money be sent in the form of a cashier’s check or international money order to a P.O. box in Panama. These days, ransomware has…

Read More

sox-compliance-and-security-700x350.png

sox compliance

Back in the late 90s and early 2000s, a number of instances of financial fraud were uncovered in large public corporations, leading to a growing feeling of distrust in the market. Back in 2001, for instance, a scandal surrounded the American energy company…

Read More

In a previous blog post, I described how I bypassed the patch for the first fix for CVE-2018-15422. That bypass was also discovered by other researchers as well. You can check that out in Cisco’s updated advisory. Now, WebExec was the name given to…

Read More

What is Penetration Testing? Penetration testing is a direct test of an application, a device, a website, an organization, and even the people that work at an organization. It first involves attempting to identify and then attempting to exploit different security weaknesses that can…

Read More

siem-ptx-blogheader-1020x394.jpg

It always seems like the clichéd image of a security expert is them sitting in a dark room with upwards of four to six bright monitors displaying different complex tasks. Regardless of how many monitors they use, we know security teams are using…

Read More

1200x628_0.jpg

Imagine if you had cuckoo clock, but instead of chiming at the top of the hour, it chimed after every minute. Not only would you be overwhelmed by noise, you’d also have a hard time figuring what time it was. This is increasingly…

Read More

1200x628.png

As each year draws to a close, the temptation is always to wipe the slate clean, put the past behind us, and have a fresh start come January. However, for most things, and particularly when it comes to cybersecurity, the best way to…

Read More

anti-virus-compare-banner-900x400.jpg

Antivirus solutions are like a water filter for your IT environment – they catch impurities that can poison your system. This is what makes detection rates such an important consideration when Linux IT security professionals are choosing an antivirus solution. These ratings analyze…

Read More

cryptojacking-banner-1920x744.jpg

It’s hard to escape hearing about cryptocurrency these days. But this new monetary system is not utilized by a large percent of the population, and is incredibly complex, so many of us are left to simply smile and nod when it’s brought up…

Read More

As an exploit writer, one of my tasks consists of gathering common vulnerabilities and exposures (CVE) and all of the information related to them in order to design an exploit for Core Impact. As part of this process I stumbled across CVE-2018-15422: A…

Read More