February 2020 Blog Posts (8)

Endpoint Detection and Response - A Guide

By @NileshGavali, CISSP,SecurityPlus

Introduction

Today’s organizations face huge challenges securing and protecting servers, networks, and …

Continue

Added by Nilesh Gavali on February 28, 2020 at 4:50pm — No Comments

Nebula – fake your echo (level01) – walkthrough

Nebula 01

Hello there, so you’ve come for more of these ha !



Video Walkthrough.



Lets login to the nebula01 using the following credentials

username: level01

password: level01



let’s move into the diectory where the flag is located. You can…

Continue

Added by Prasanna V Balaji on February 20, 2020 at 10:30am — No Comments

Cryptocurrency Fraud Reached $4.3 Billion in 2019

Cryptocurrency fraud is aggressively on the rise and topped over $4 billion last year, according to the security tracking company Chainalysis.

This is especially shocking to those who thought they had found an incredible investment in the cryptocurrency world, yet were swindled out of everything.  As part of these cryptocurrency scams, victims…

Continue

Added by Matthew Rosenquist on February 18, 2020 at 11:22pm — No Comments

Nebula – walkthrough – EXPLOIT (level00)

Nebula : flag00

Hey, guys i just decided to solve the Nebula machine from exploit education.

I’ve also made a youtube video about it which you can refer to.

Youtube link : https://youtu.be/9Xd28FjugM8…

Continue

Added by Prasanna V Balaji on February 18, 2020 at 4:30pm — No Comments

2020 Techno Security & Digital Forensic conference in San Diego CA on March 9th-11th

I am looking forward to the 2020 Techno Security & Digital Forensic conference in San Diego CA on March 9th-11th. I was honored to deliver last year's keynote and looking at the list of sessions, this year's lineup is even better. 

Drones,…

Continue

Added by Matthew Rosenquist on February 14, 2020 at 12:58pm — No Comments

There is No Easy Fix to AI Privacy Problems

Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.

Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even greater volumes of data as part of the inference processing while in operation. These AI…

Continue

Added by Matthew Rosenquist on February 9, 2020 at 2:49am — No Comments

How SDPs are Killing VPNs and Firewall Exploits

Recently, we heard about two major vulnerabilities in VPN gateways and enterprise firewalls that demonstrate the extent to which these time-tested security products are not immune to exploitation.

 

At…

Continue

Added by jaideep khanduja on February 4, 2020 at 5:00pm — No Comments

Avast Shuts Down its Data Sales Subsidiary Due to Privacy Backlash

Avast was recently caught selling user's web browsing data.  Sensitive data like website destinations, search terms, and even what videos customers watched were collected by Avast software residing on customers' computers.  The data was repackaged and then sold by their Jumpshot subsidiary.  When the investigative reporting story became public, users…

Continue

Added by Matthew Rosenquist on February 1, 2020 at 8:28am — No Comments

Monthly Archives

2020

2019

2018

2017

2016

2015

2014

2013

2012

1999

FireCompass

Forum

CISO as an enabler

Started by Maheshkumar Vagadiya Jul 30. 0 Replies

Share the instances where you were able to convince the Executive management /board that CISO function is enabler rather then a hindrance.Thanks youMaheshContinue

Has Anyone Evaluated Digital Signature (like Docusign)?

Started by CISO Platform. Last reply by SACHIN BP SHETTY Apr 24. 1 Reply

(question posted on behalf of a CISO member)Has anyone evaluated digital signature (like Docusign), any specific risk/ security areas to be looked into while finalising a vendor? Any and all inputs will be very much appreciated.Continue

What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?

Started by CISO Platform. Last reply by ANAND SHRIMALI May 20. 4 Replies

(question posted on behalf of a CISO member)What are your strategies for using Zoom in your organization after recent vulnerabilities in news about Zoom platform?Related Question: …Continue

[Please Suggest] Corona Virus: Security advisory for work from home

Started by CISO Platform. Last reply by Bhushan Deo Mar 20. 12 Replies

(question posted on behalf of a CISO member)Due to CORONA virus most of the organizations are allowing their employees to work form home.Has any one issued security advisory for work from home ?Continue

Tags: #COVID19

Follow us

Contact Us

Email: contact@cisoplatform.com

Mobile: +91 99002 62585

InfoSec Media Private Limited,First Floor,# 48,Dr DV Gundappa Road, Basavanagudi,Bangalore,Karnataka - 560004

© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service