Opinion: Cybersecurity for everyone
Cybersecurity companies mainly focus on large enterprises. This leaves those residential clients, micro, small and medium enterprises potentially not able to afford proper cybersecurity solutions. It is rather unfair that cyber…
Read moreWhat is DMARC?
DMARC, or Domain Based Message Authentication, Reporting & Conformance, is a way to authenticate email messages originating from ones own domain. This improves deliverability, as well as increases domain reputation but…
Read moreCritical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked
Google is urging users to immediately update chrome due to a critical zero day vulnerability that would allow your device to be hijacked. This security flaw currently in the wild,…
Read moreWhat is SAML & How does it work?
What is SAML?Security Markup Language or SAML for short has its primary role in online security. It is an open standard based upon Extensible Markup Language (XML) format. This protocol…
Read moreCyberwarfare – The Evolution Of War, From The Real World To The Virtual World
I am subscribed to a large number of cybersecurity-related blogs and mailing lists and the amounts of varying attacks that I see on a daily basis leaves me in awe,…
Read moreHow To Setup A Personal Fedora Rawhide Repository
To sync rawhide repos issue the following rsync commandrsync -avvpPSHA rsync://linuxsoft.cern.ch/fedora-enchilada/linux/development/rawhide/Everything/x86_64/ whateverOf course, replace "whatever" with the local path where you want the files to go. Use the command below to sync…
Read moreSigns To Watch Out For If You Suspect An Email To Be A Phishing Email
One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…
Read moreWho are the hacking group LABYRINTH CHOLLIMA
Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)
Read moreAlert: 3CX Compromised
On 29th March 2023, the popular VoIP communications system used by businesses worldwide, 3CX, has reportedly been targeted in a supply chain attack. A digitally signed legitimate version of the…
Read moreHow The Good Guys Can Stay Ahead of Hackers
Staying ahead of hackers and their attacks requires a multi-faceted approach that involves a combination of proactive and reactive measures. Here are some cybersecurity strategies that can help lower the…
Read more