Understanding the Cyber Kill Chain in the Cloud

Share this…FacebookPinterestTwitterLinkedinRedditThe cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill chain and how it applies […]

How to Build a Virtual Penetration Testing Lab

Share this…FacebookPinterestTwitterLinkedinRedditAs a penetration tester it is important to have a controlled environment in which to hone your skills and test new techniques. Testing on systems you do not own is illegal, even if it is just harmless curiosity. In this article I will show you how to build a virtual penetration testing lab using […]

How to Install Metasploitable in VirtualBox

Share this…FacebookPinterestTwitterLinkedinRedditIn this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a full lab, but I highly […]

Selecting a Home Security Camera System

Share this…FacebookPinterestTwitterLinkedinRedditInstalling a home security camera system in your home, business, or vacation home is one of the easiest way to deter crime and gain peace of mind. While selecting a home security camera system may seem like a daunting task, it is relatively easy to select the right system based on the area you […]

Broken Arrow Public Schools Targeted in Ransomware Attack

Share this…FacebookPinterestTwitterLinkedinRedditThe city of Tulsa Oklahoma has announced that the Broken Arrow schools have suffered a ransomware attack. This attack comes not long after a series of ransomware attacks left local governments in Florida scrambling. The type of ransomware is unknown District officials released a statement, but it is uknown when the attack began. The […]

Equifax to Pay $700 Million for Data Breach

Share this…FacebookPinterestTwitterLinkedinRedditRemember in 2017? When the Equifax data breach exposed the personal information of more than half of all United States citizens? Investigators have slapped Equifax with a $700 million fine for the 2017 data breach according to a statement. Hefty Breach, Hefty Fine The $700 million proposed settlement includes fines from various agencies and […]

Malware Attack In Louisiana, Declare State of Emergency

Share this…FacebookPinterestTwitterLinkedinRedditGovernor of Louisiana John Bel Edwards has declared a state of emergency after a malware attack in Louisiana. The attack hit Louisiana state systems on July 8. The Monroe city school system first reported the incident. Shortly thereafter the Sabine Parish school system reported a virus on its website. Officials released a statement saying […]

Over 800,000 Systems Still Vulnerable to BlueKeep

Share this…FacebookPinterestTwitterLinkedinReddit800,000 systems are still vulnerable to the BlueKeep exploit. Microsoft released a patch 2 months ago including ‘end of life’ systems such as Windows 7 and XP. According to a recent report by BitSight, a risk management firm, they detected 805,665 online systems that remain vulnerable. Although this is a 17% decrease from the […]

Google increases bug bounty to $30000

Share this…FacebookPinterestTwitterLinkedinRedditGoogle increases their bug bounty reward to a record $30,000 for white hat hackers that discover vulnerabilities in the Chrome browser. More serious vulnerabilities, such as those that result in persistence in the browser can fetch up to a $150,000 reward. In post on the Google Security blog, Google indicates they will increase the […]

Key Biscayne Ransomware Attack Is Third City in Florida

Share this…FacebookPinterestTwitterLinkedinRedditThe Key Biscayne ransomware attack marks the third attack on a Florida city in just a month. According to city officials, a “data security event” occurred on Sunday, June 23, 2019. IT professionals working for the city decided to take systems offline in an abundance of caution. The initial compromise occurred when a city […]