February 2020 Blog Posts (7)

Endpoint Detection and Response - A Guide

By @NileshGavali, CISSP,SecurityPlus


Today’s organizations face huge challenges securing and protecting servers, networks, and …


Added by Nilesh Gavali on February 28, 2020 at 4:50pm — No Comments

Nebula – fake your echo (level01) – walkthrough

Nebula 01

Hello there, so you’ve come for more of these ha !

Video Walkthrough.

Lets login to the nebula01 using the following credentials

username: level01

password: level01

let’s move into the diectory where the flag is located. You can…


Added by Prasanna V Balaji on February 20, 2020 at 10:30am — No Comments

Cryptocurrency Fraud Reached $4.3 Billion in 2019

Cryptocurrency fraud is aggressively on the rise and topped over $4 billion last year, according to the security tracking company Chainalysis.

This is especially shocking to those who thought they had found an incredible investment in the cryptocurrency world, yet were swindled out of everything.  As part of these cryptocurrency scams, victims…


Added by Matthew Rosenquist on February 18, 2020 at 11:22pm — No Comments

Nebula – walkthrough – EXPLOIT (level00)

Nebula : flag00

Hey, guys i just decided to solve the Nebula machine from exploit education.

I’ve also made a youtube video about it which you can refer to.

Youtube link : https://youtu.be/9Xd28FjugM8…


Added by Prasanna V Balaji on February 18, 2020 at 4:30pm — No Comments

There is No Easy Fix to AI Privacy Problems

Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.

Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even greater volumes of data as part of the inference processing while in operation. These AI…


Added by Matthew Rosenquist on February 9, 2020 at 2:49am — No Comments

How SDPs are Killing VPNs and Firewall Exploits

Recently, we heard about two major vulnerabilities in VPN gateways and enterprise firewalls that demonstrate the extent to which these time-tested security products are not immune to exploitation.




Added by jaideep khanduja on February 4, 2020 at 5:00pm — No Comments

Avast Shuts Down its Data Sales Subsidiary Due to Privacy Backlash

Avast was recently caught selling user's web browsing data.  Sensitive data like website destinations, search terms, and even what videos customers watched were collected by Avast software residing on customers' computers.  The data was repackaged and then sold by their Jumpshot subsidiary.  When the investigative reporting story became public, users…


Added by Matthew Rosenquist on February 1, 2020 at 8:28am — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service