Cybersecurity
What is the Difference Between Attack Surface Management & Vulnerability Management
With how quickly software and businesses evolve, this causes problems with the traditional IT asset and vulnerability management practices. As a result this has opened a new technological segment known…
Read moreOpinion – Red Teaming Vs Purple Teaming
In this post I am looking to get an idea of the following through a poll: If you were looking to start a career in cybersecurity, which would you go…
Read more900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors
Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read more


