web analytics

Digital Forensics and Investigations

Most used common passwords: https://www.ncsc.gov.uk/blog-post/passwords-passwords-everywhere Chain of Custody form: https://www.nist.gov/document/sample-chain-custody-formdocx pdfinfo – you can install it using sudo apt install poppler-utils here are many online and offline tools to read the EXIF data from images. One command-line tool is exiftool. ExifTool is used to read and write metadata in various file types, such as JPEG images. (The AttackBox … Read more

Cyber Kill Chain

According to Lockheed Martin, the Cyber Kill Chain has seven steps: Recon: Recon, short for reconnaissance, refers to the step where the attacker tries to learn as much as possible about the target. Information such as the types of servers, operating system, IP addresses, names of users, and email addresses, can help the attack’s success. Weaponization: … Read more

OWASP: A01:2021 – Broken Access Control

Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user’s limits. Broken access control means that an attacker can access information or perform actions not intended for them. Common access … Read more

OWASP Top 10

A01:2021-Broken Access Control moves up from the fifth position to the category with the most serious web application security risk; the contributed data indicates that on average, 3.81% of applications tested had one or more Common Weakness Enumerations (CWEs) with more than 318k occurrences of CWEs in this risk category. The 34 CWEs mapped to Broken … Read more

Check Point R81 – ClusterXL

ClusterXL is a Check Point software-based cluster solution for Security Gateway redundancy and LoadSharing. A High Availability Security Cluster ensures Security Gateway and VPN connection redundancy by providing transparent failover to a backup Security Gateway in the event of failure. High Availability mode supports both IP v4 and IP v6. A Load Sharing Security Cluster … Read more

Olympus Suffered a Second Cyber Attack that impacted it’s operations in the America

Japanese medical tech giant Olympus suffered a subsequent cyber attack, almost exactly one month after a ransomeware attack that disrupted its European, Middle East, and Africa (EMEA) operations. As per the information published on the company’s website, Olympus is currently investigating a “potential cybersecurity incident” detected October 10, 2021 that is affecting its Americas (U.S., … Read more