Cyber Security

Cyber Security - Word Cloud
Cyber Security - Word Cloud
  • Fixed: Your current security settings do not allow this file to be downloaded
    If you are trying to download some programs or some drivers, an error occurs saying “Your current security settings do not allow this file to be downloaded“. You can try the solutions below to fix this issue. Solution 1: Change the security setting of the IE browser Follow the steps below: 1. Open Internet Explorer. 2. Click Tools in the […]
  • Beginning with Nessus on Kali Linux
    Kali Linux, a Linux distribution designed specifically for penetration testing, comes prepackaged with many pen test tools. Nessus® provides a penetration tester with a wealth of capabilities that will assist in the engagement, such as: Identifying local and remote vulnerabilities Configuration and compliance audits Checking for default credentials Web application scanning Nessus isn’t installed on […]
  • Brute Force – Cyber Attack
    Definition(s):  A method of accessing an obstructed device by attempting multiple combinations of numeric/alphanumeric passwords.Source(s):NIST SP 800-101 Rev. 1  A method of accessing an obstructed device through attempting multiple combinations of numeric/alphanumeric passwords.Source(s):NIST SP 800-72  In cryptography, an attack that involves trying all possible combinations to find a match.Source(s):NIST SP 1800-21B under Brute-Force Attack from NISTIR 8053  In […]
  • The time it takes a hacker to brute force your password in 2022
    Funny but true story… So I walked through Khol’s today to return an Amazon package as Khol’s locally accepts Amazon package returns, and I tried my best to navigate the store with Zero interruption as I was on a mission. As I was passing the checkout cashier, who warmly greeted me when I entered, I […]
  • Common Network tools – ping, telnet, netstat and arp
    ping (Packet Internet Gropper) The Ping command allows a user to ping another network IP address. Ping command sends ICMP ECHO_REQUEST packets to other hosts, and this command can help determine the connectivity to the remote host. This is similar to playing “Marco Polo” in a body of water. Simple ping command syntax is ping […]
  • Norton 360 Deluxe vs Bitdefender Total Security | Best antivirus for PC
    I’ll be specifically comparing the Norton 360 Deluxe plan, their second most expensive, to Bitdefender’s most expensive Total Security plan. Why do you ask? Because they both claim to offer the same level of protection and supplemental features so, by and large, they’re almost identical packages…or so I thought… 🔥 Bitdefender vs Norton: Malware protection: […]
  • To Win the Next War, the Pentagon Needs Nerds
    Data scientists, coders, and other techies could prove decisive in future conflicts—if Uncle Sam can recruit them. When Russia invaded Ukraine, the U.S. Department of Defense (DoD) turned to a team of machine learning (ML) and artificial intelligence (AI) experts to make sense of an avalanche of information about the conflict. These tech experts crafted […]
  • How Important Cybersecurity Really Is Today?
    How Important Cybersecurity Really Is Today? In the world of the internet and ever-evolving technology standards, cybersecurity has quickly become a top concern and priority for individuals and companies worldwide. Network and web hackers always aim to penetrate the protection of businesses to steal personal and sensitive data.  Since the number of attempts is continuously […]
  • What is Phishing?
    No, we are not talking about going on a fishing charter in the Florida Keys, we are focusing on a Cyber Security phenomenon that is “Today’s New Normal”, and no we are not talking about the Covid-19 term, this is a Cyber Security Term that is defined as: phishing noun Definition of phishing : a scam by […]
  • How To Generate 4096-bit Secure ssh Key with ssh-keygen
    Ssh is a secure protocol used to manage remote systems like Linux, BSD, UNIX, network devices event windows operating systems. The traffic between systems is encrypted. Ssh uses asymmetric keys in order to encrypt and make traffic invisible to the others who reside between systems in the network. The encryption power comes from key bit […]
  • How To Set up SSH Keys on a Linux / Unix System
    I recently read that SSH keys provide a secure way of logging into a Linux and Unix-based server. How do I set up SSH keys on a Linux or Unix-based system? In SSH for Linux/Unix, how do I set up public-key authentication? This page explains a public key and shows you how to set up […]
  • Why a Vulnerability Scan is Not Enough to Keep Business Running Smoothly
    Today’s cybersecurity threat landscape is so vast and complex that it’s impossible to manage threats manually. Vulnerability management is a typical example: tech teams wrestle with many vulnerabilities across apps, networks, and endpoints. A 2019 Kaspersky report outlines the size of the challenge. The security firm identified over 24 million unique malicious malware objects in 2019. […]
  • Russian Hackers Tried Attacking Ukraine’s Power Grid with Industroyer2 Malware
    On Tuesday, the Computer Emergency Response Team of Ukraine (CERT-UA) disclosed that it thwarted a cyberattack by Sandworm, a hacking group affiliated with Russia’s military intelligence, to sabotage the operations of an unnamed energy provider in the country. “The attackers attempted to take down several infrastructure components of their target, namely: Electrical substations, Windows-operated computing […]
  • Stuxnet
    Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built […]
  • Kali Linux 2022.1 Release (Visual Updates, Kali Everything ISOs, Legacy SSH)
    Just announced from Kali, their new 2022.1 release is available for a dist-upgrade or a fresh install! “Today, we are pushing out the first Kali Linux release of the new year with Kali Linux 2022.1, and just in time for Valentine’s Day! This release brings various visual updates and tweaks to existing features and is ready to be downloaded or upgraded if […]
  • TRYHACKME.COM’s Advent of Christmas 3!
    TryHackMe launches Advent of Cyber – set to attract over 30,000 participants! TRYHACKME.COM’s Advent of Chrismas 3! All exercises in Advent of Cyber follow a fun Christmas story. This year, the elf McSkidy needs your help to hack back and undo the grinch’s malicious activities. Each day in December, a new (beginner-friendly) task will be […]
  • What is end-to-end encryption & how does it work?
    Over the past few years, the vulnerability of social networks like Facebook or messaging apps like Chat has given rise to using end-to-end encrypted platforms to protect communications. Today, platforms like WhatsApp, Signal, and PreVeil use end-to-end encryption to protect the exchanges of users’ data. Yet what is end-to-end encryption, and how does it work? […]
    Why the military needs Silicon Valley, now more than ever The pentagon is not the most inviting place for first-time visitors, and it was no different for Chris Lynch. When he rode the escalator out of the Pentagon metro station, Lynch was greeted by guard dogs and security personnel wearing body armor and toting machine guns. […]
  • KYC, Know Your Customer in banking
    KYC (Know Your Customer) is today a significant element in the fight against financial crime and money laundering, and customer identification is the most critical aspect as it is the first step to better perform in the other stages of the process. The global anti-money laundering (AML) and countering the financing of terrorism (CFT) landscape raise tremendous stakes […]
  • Colonial Pipeline Company – Ransomware – Gasoline Shortage
    Why are people filling plastic bags and taking ill-thought-out plans with gasoline in the North-Eastern region of the United States of America? The VPN account, which has since been deactivated, didn’t use multifactor authentication, a basic cybersecurity tool, allowing the hackers to breach Colonial’s network using just a compromised username and password. It’s not known […]
  • Ukraine – Kyiv (Kiev) – Digital Forensics
    o, I have decided to start documenting my Cyber Security skills and what I can bring to the table for a situation. This one is going to be a work in progress, so bear with me here.
  • TCP vs UDP
    Here, we will compare these two protocols’ main characteristics, and we will look at TCP Protocol (Transmission Control Protocol) and UDP Protocol (User Datagram Protocol). This comparison is very important and, generally, a question asked in Network Engineering, Cyber Security, or Infrastructure interviews. It also is important for students and security certification tets and is a simple […]
  • OSI Model And 7 Layers Of OSI Model Explained
    The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the […]
  • How To Use Proxy chains with Kali Linux
    Proxy chains are open source software for Linux systems and come pre-installed with Kali Linux, the tool redirects TCP connections through proxies like TOR, SOCKS, and HTTP (S), allowing us to chain proxy servers. With proxy chains, we can hide the IP address of the source traffic and evade IDS and firewalls. We can use […]
  • Edward Snowden – Collection of interviews
  • The U.S. Government Needs to Hire More Geeks
    Randy Watson is choking back tears. He is a proud and grizzled Vietnam veteran, standing in front of an audience of hundreds. With the help of his daughter, Randy has just driven 1,100 miles from his home in Joplin, Missouri to Washington, DC to tell the story of how he almost died. But as he […]
  • How to Find Any Website’s Vulnerabilities with Nikto
    Before attacking any website, it’s critical to do good reconnaissance. A few minutes of recon can save you hours on a hack. Simply trying various attacks without first finding which attacks the site is vulnerable to is pure foolishness. There are a number of tools and applications to find vulnerabilities in websites, but one of the […]
  • Vulnerability Scanning with Nexpose
    ​One of the keys to success as a hacker, pentester, or cyber warrior is finding vulnerabilities or flaws in the target system they exploit when they hack. There are several ways, including various Web application vulnerability testers such as Nikto and searching through vulnerability databases such as There is a method to be more specific. What if […]