How to Install MySQL on Mac

Share this…FacebookPinterestTwitterLinkedinRedditWelcome back to another SecuringNinja tutorial. No cyber security researcher should be with out a database to practice their skills on, or just to store tons of relational data. Today we will show you how to install MySQL on a Mac. Having a local database is perfect for running websites locally, or for providing […]

7 Types of Cyber Attacks That Could Be Targeting You Right Now!

Share this…FacebookPinterestTwitterLinkedinRedditWelcome back to another informative article by SecuringNinja. Today we will explain the 7 most common types of cyber attacks that cyber criminals use everyday. Fear not, we will also share tips and tricks to protect against these types of cyber attacks.  Cyber criminals are continuously evolving their tactics and coming up with ever […]

Install Kali Linux in VirtualBox on Mac

Share this…FacebookPinterestTwitterLinkedinRedditToday we cover how to install Kali Linux in Virtualbox on Mac. In the tutorial below we explain all the steps needed to install Kali Linux in VirtualBox on a Mac. We also answer common questions and provide solutions to common problems people face while trying to install Kali Linux in VirtualBox on Mac. […]

Fast Flux DNS: What is it? How does it work?

Share this…FacebookPinterestTwitterLinkedinRedditCyber criminals are using ever sneakier tactics to avoid detection of their botnets and C&C servers. One such tactic botnet masters are using is fast-flux DNS. Fast-flux DNS was originally implemented by the Storm Worm botnet masters in 2007. Since then, numerous malware variants have used fast-flux DNS to avoid detection by the authorities. […]

The Ultimate Resource for the Security Intelligence Community has Launched!

Share this…FacebookPinterestTwitterLinkedinRedditWe can not believe the day has finally come! After months in the making we are proud to officially launch the ultimate security blog. Each week will bring you the latest news and updates in cybersecurity, personal security, and the latest cyber breach news. Our team of writers is passionate about security and keeps […]

How to Build a Virtual Penetration Testing Lab

Share this…FacebookPinterestTwitterLinkedinRedditAs a penetration tester it is important to have a controlled environment in which to hone your skills and test new techniques. Testing on systems you do not own is illegal, even if it is just harmless curiosity. In this article I will show you how to build a virtual penetration testing lab using […]

Inside a Brute Force Router Takeover

Share this…FacebookPinterestTwitterLinkedinRedditRouters provide access to the Internet for millions of users, but hackers are also using routers to gain access into your home network. In this article I expose the dangers of default credentials by performing a brute force router takeover. Many modern home routers offer a remote management feature, and luckily router manufacturers have […]

Understanding the Cyber Kill Chain in the Cloud

Share this…FacebookPinterestTwitterLinkedinRedditThe cyber kill chain defines the lifecycle of a cyber attack and identifies various phases during a system intrusion. Although there are numerous interpretations of the cyber kill chain, the most basic form consists of seven stages. In this post I describe these seven stages of the cyber kill chain and how it applies […]

How to Install Metasploitable in VirtualBox

Share this…FacebookPinterestTwitterLinkedinRedditIn this article I go over how to install Metasploitable in VirtualBox. Metasploitable is a virtual machine with several intentional misconfigurations and vulnerabilities for you to exploit. This is a great tool for sharpening your penetration testing skills. You can definitely get Metasploitable up and running with out a full lab, but I highly […]

Equifax to Pay $700 Million for Data Breach

Share this…FacebookPinterestTwitterLinkedinRedditRemember in 2017? When the Equifax data breach exposed the personal information of more than half of all United States citizens? Investigators have slapped Equifax with a $700 million fine for the 2017 data breach according to a statement. Hefty Breach, Hefty Fine The $700 million proposed settlement includes fines from various agencies and […]