Opinion – Red Teaming Vs Purple Teaming
In this post I am looking to get an idea of the following through a poll: If you were looking to start a career in cybersecurity, which would you go…
Read moreWhat is Confidential Computing?
What is Confidential Computing? Confidential computing is an approach which takes advantage of secure enclave technology. This in turn enables the creation of a trusted execution environment (TEE) based on…
Read more900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors
Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read moreMalicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks.
As of Februrary 2023, numerous instances of malicious Microsoft OneNote files (.one) have been detected and stopped from being used to obtain intial access to victims by BlackpointCyber's SOC with…
Read moreWho Is The Cl0p Ransomware Group?
The Cl0p ransomware gang is a notorious cyber criminal gang that is known for deploying ransomware attacks. They are associated with the deployment of sophisticated ransomware attacks. These attacks involve…
Read moreHuntress demonstrates MOVEit Transfer Zero Day Vulnerability
In this video we can see the huntress team able to recreate the MOVEit zero day vulnerability CVE-2023-34362. Please visit the Vendors website to ensure you get the latest updated…
Read moreWindows 11 Security Tips, Keeping You Safe
In this post we will look at some basic security mechanisms that you can use to help keep you safe from online threats. General Security Tips Be careful when connecting…
Read moreExploitation of Critical MOVEit Transfer Vulnerability Observed By Rapid7
In the post regarding the initial MOVEit Transfer vulnerability Rapid7 is seeing exploitation of 3 vulnerabilities in MOVEit Transfer software. The first vulnerability was given a CVE on June 2nd…
Read moreAustralian Scamming Victims Meet with Government Officials
In this 2nd part to my other post regarding scammers taking millions from Australians, we see some of the scamming victims meet with government officials who are not aware of…
Read more