Fast Flux DNS: What is it? How does it work?

Cyber criminals are using ever sneakier tactics to avoid detection of their botnets and C&C servers. One such tactic botnet masters are using is fast-flux DNS. Fast-flux DNS was originally implemented by the Storm Worm botnet masters in 2007. Since then, numerous malware variants have used fast-flux DNS to avoid detection by the authorities. Fast-flux […]

Selecting a Home Security Camera System

Installing a home security camera system in your home, business, or vacation home is one of the easiest way to deter crime and gain peace of mind. While selecting a home security camera system may seem like a daunting task, it is relatively easy to select the right system based on the area you intend […]

The Ultimate Resource for the Security Intelligence Community has Launched!

We can not believe the day has finally come! After months in the making we are proud to officially launch the ultimate security blog. Each week will bring you the latest news and updates in cybersecurity, personal security, and the latest cyber breach news. Our team of writers is passionate about security and keeps their […]

Understanding the Cyber Kill Chain in the Cloud

The cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill chain and how it applies in […]

How to Build a Virtual Penetration Testing Lab

As a penetration tester it is important to have a controlled environment in which to hone your skills and test new techniques. Testing on systems you do not own is illegal, even if it is just harmless curiosity. In this article I will show you how to build a virtual penetration testing lab using VirtualBox, […]

Inside a Brute Force Router Takeover

Routers provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, and luckily router manufacturers have stopped […]

How to Install Metasploitable in VirtualBox

In this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a full lab, but I highly recommend […]

Broken Arrow Public Schools Targeted in Ransomware Attack

The city of Tulsa Oklahoma has announced that the Broken Arrow schools have suffered a ransomware attack. This attack comes not long after a series of ransomware attacks left local governments in Florida scrambling. The type of ransomware is unknown District officials released a statement, but it is uknown when the attack began. The district […]

Malware Attack In Louisiana, Declare State of Emergency

Governor of Louisiana John Bel Edwards has declared a state of emergency after a malware attack in Louisiana. The attack hit Louisiana state systems on July 8. The Monroe city school system first reported the incident. Shortly thereafter the Sabine Parish school system reported a virus on its website. Officials released a statement saying that: […]

Over 800,000 Systems Still Vulnerable to BlueKeep

800,000 systems are still vulnerable to the BlueKeep exploit. Microsoft released a patch 2 months ago including ‘end of life’ systems such as Windows 7 and XP. According to a recent report by BitSight, a risk management firm, they detected 805,665 online systems that remain vulnerable. Although this is a 17% decrease from the previous […]

Copyright © 2020 SecuringNinja.com