FAQ – What Is The Difference Between Linux RPM & DEB Packages?
Debian (DEB) and Red Hat Package Manager (RPM) are the two most commonly used package formats for Linux distributions. Both formats are used for package management, there are also differences…
Read moreVendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security
It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…
Read moreThe Good And The Bad Of Electronic Signatures
Electronic Signatures have been in use for years. the Covid pandemic and the shift to a remote working model brought them into more mainstream use. In this post we will…
Read moreEducation & Research Sector Sees Highest Levels Of Cyber Attacks
With the education and research sectors being the early adopters of digital platforms for delivery of course material and conducting exams, digital transformation has been an on going process for…
Read moreAll Of Okta’s Client Data Exfiltrated In Hack
Okta has admitted that it has greatly messed up when investigating last month's hack. It failed to pick up that 99% of its data had been exfiltrated by threat actors.…
Read moreOkta Hacked Again As a 2FA Company Fails To Enforce 2FA
Okta is back in the headlines, this time due to not implementing 2FA for employee accounts. 2FA is something that is a crucial must have today and for all accounts…
Read moreGPS Spoofing, Aircraft Being Hacked When Flying Over The Middle East
In recent and alarming developments, dozens of commercial flights that are flying over parts of the Middle East reporting experiencing GPS spoofing attacks in recent months. Such attacks deal with…
Read moreTop Ransomware Threats Of 2023
In this post we will list the top 5 ransomware strains of 2023. Lockbit AlpVM CLOP Royal BlackBasta Now that 2024 has started, the Lockbit ransomware strain is still at…
Read moreTor Project Removes Relays Due to For Profit Risky Activity
The tor project explained why a number of network relays were removed citing that they represented a threat to the safety & security of all Tor network users. The tor…
Read moreAI Workloads Get A Boost From New Chip Designs
New chip designs are revolutionizing the way AI workloads are processed, which includes an analog chip that improves computer vision. These designs would revolutionize AI by taking advantage of innovative…
Read more