Cybersecurity
FAQ – What are YARA Rules?
YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…
Read morePassenger Devices Pose Cyber Security Risk to Aircraft
With modern day aircraft becoming so dependent on technology, one doesn't really think of them as a platform that is at risk of being hacked. With the way they are…
Read moreProtecting your Credit Card Details
With various malicious threat actors continuously evolving their attack techniques it is becoming extremely important to keep our credit card details safe in our highly networked world. With how convenient…
Read moreCyber Insurance, and its Critical Role In Front Line Cyber Defenses
Cybersecurity, cyber insurance and ransomware tend to go hand in hand. Both security and insurance providers work tirelessly to reduce the impact of ransomware on businesses which is one of…
Read moreWhat is the Difference Between Attack Surface Management & Vulnerability Management
With how quickly software and businesses evolve, this causes problems with the traditional IT asset and vulnerability management practices. As a result this has opened a new technological segment known…
Read moreOpinion – Red Teaming Vs Purple Teaming
In this post I am looking to get an idea of the following through a poll: If you were looking to start a career in cybersecurity, which would you go…
Read moreWhat is Confidential Computing?
What is Confidential Computing? Confidential computing is an approach which takes advantage of secure enclave technology. This in turn enables the creation of a trusted execution environment (TEE) based on…
Read more900,000 MikroTik Routers Vulnerable to Total Takeover by Malicious Threat Actors
Mikrotik routers are popular targets for threat actors including nation state groups. Roughly 900,000 devices can be potentially attacked via a prvilege escalation vulnerability in the Router OS firmware. CVE-2023-30788…
Read moreHow to Mitigate Malicious OneNote Attacks and the Indicators of Compromise
This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…
Read moreMalicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks.
As of Februrary 2023, numerous instances of malicious Microsoft OneNote files (.one) have been detected and stopped from being used to obtain intial access to victims by BlackpointCyber's SOC with…
Read more