Recent Posts

Continue Reading
Posted in Phishing Security Security Tools

Security Awareness

Constantly enforcing security is not enough for your organization to successfully protect its hardware, software, and data from attack, damage,…

Continue Reading
Posted in Security Advisories Vulnerabilities Zero Day

Counter-Strike 1.6 servers actively used zero-days to spread malware

The Security research team discovered a surprising amount of Counter-Strike 1.6 multiplayer servers maliciously exploiting remote code execution (RCE) vulnerabilities…

Continue Reading
Posted in 20 Critical Controls Security Controls Security Tools

Critical Control 4 – Controlled Use of Administrative Privileges

Critical Control 4 “Controlled Use of Administrative Privileges” is a basic control based on properly controlling administrative privileges throughout an…

Continue Reading
Posted in Ethical Hacking Basics Penetration Testing Security Tools

What Is PTES (Penetration Testing Execution Standard)?

Penetration Testing Execution Standard (PTES) is a standard designed to assist both businesses and security service providers with terminology and…

Continue Reading
Posted in Ethical Hacking Basics Information Gathering Security Tools

Information Gathering – Nmap

Nmap is a well known free and open source tool used for network discovery and security testing. A vast majority…

Continue Reading
Posted in 20 Critical Controls Security Controls Security Tools

Critical Control 3 – Continuous Vulnerability Management

Critical Control 3 “Continuous Vulnerability Management” is a basic control based on continually collecting, assessing, and taking action on new…

Continue Reading
Posted in Ethical Hacking Basics Information Gathering Security Tools

Information Gathering – DirBuster

DirBuster is a java application that brute forces directories and files names on web and application servers. This application can…

Continue Reading
Posted in Security WordPress Zero Day

Popular WordPress Plugin Zero-Day Actively Exploited

Attackers started taking advantage of the zero-day around three weeks ago and are continuing to take advantage. WP GDPR Compliance…

Continue Reading
Posted in 20 Critical Controls Security Controls Security Tools

Critical Control 2 – Inventory and Control of Software Assets

Critical Control 2 “Inventory and Control of Software Assets” is a basic control based on inventorying and controlling software within…

Continue Reading
Posted in Security Advisory Vulnerability Zero Day

Cisco Zero-Day found in Certain Cisco Security Products Actively Being Exploited

Hackers are actively exploiting a Cisco zero-day vulnerability found in certain security products to cause a form of denial-of-service (DoS)….