Cybersecurity

Eagle-Eye-T-Cyber-Insurance

Cyber Insurance, and its Critical Role In Front Line Cyber Defenses

Cybersecurity, cyber insurance and ransomware tend to go hand in hand. Both security and insurance providers work tirelessly to reduce the impact of ransomware on businesses which is one of…

Read more
What is the Difference Between Attack Surface Management & Vulnerability Management

What is the Difference Between Attack Surface Management & Vulnerability Management

With how quickly software and businesses evolve, this causes problems with the traditional IT asset and vulnerability management practices. As a result this has opened a new technological segment known…

Read more
Red Teaming Vs Purple Teaming

Opinion – Red Teaming Vs Purple Teaming

In this post I am looking to get an idea of the following through a poll: If you were looking to start a career in cybersecurity, which would you go…

Read more
What-is-Confidential-Computing

What is Confidential Computing?

What is Confidential Computing? Confidential computing is an approach which takes advantage of secure enclave technology. This in turn enables the creation of a trusted execution environment (TEE) based on…

Read more
900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors

900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors

Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…

Read more
How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…

Read more
Malicious-One-Note-Files-Insta

Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks.

As of Februrary 2023, numerous instances of malicious Microsoft OneNote files (.one) have been detected and stopped from being used to obtain intial access to victims by BlackpointCyber's SOC with…

Read more
Windows 11 Security Tips, Keeping You Safe

Windows 11 Security Tips, Keeping You Safe

In this post we will look at some basic security mechanisms that you can use to help keep you safe from online threats. General Security Tips Be careful when connecting…

Read more
3 Types of Data Protection

3 Types of Data Protection and the Difference Between Data Privacy and Data Security

In this post we will look at the 3 types of data protection as well as look at the difference between data protection and data security.   3 Types of…

Read more
What is Data Privacy and Why is IT Important?

What is Data Privacy and Why is Data Privacy Important?

Data Privacy Defined Data privacy is the ability for one to control how, what, and where our personal or confidential information is gathered, stored or shared. This was important way…

Read more