All Blog Posts (1,204)

Cryptocurrency Fraud Reached $4.3 Billion in 2019

Cryptocurrency fraud is aggressively on the rise and topped over $4 billion last year, according to the security tracking company Chainalysis.

This is especially shocking to those who thought they had found an incredible investment in the cryptocurrency world, yet were swindled out of everything.  As part of these cryptocurrency scams, victims…


Added by Matthew Rosenquist on February 18, 2020 at 11:22pm — No Comments

Nebula – walkthrough – EXPLOIT (level00)

Nebula : flag00

Hey, guys i just decided to solve the Nebula machine from exploit education.

I’ve also made a youtube video about it which you can refer to.

Youtube link :…


Added by Prasanna V Balaji on February 18, 2020 at 4:30pm — No Comments

There is No Easy Fix to AI Privacy Problems

Artificial intelligence – more specifically, the machine learning (ML) subset of AI - has a number of privacy problems.

Not only does ML require vast amounts of data for the training process, but the derived system is also provided with access to even greater volumes of data as part of the inference processing while in operation. These AI…


Added by Matthew Rosenquist on February 9, 2020 at 2:49am — No Comments

How SDPs are Killing VPNs and Firewall Exploits

Recently, we heard about two major vulnerabilities in VPN gateways and enterprise firewalls that demonstrate the extent to which these time-tested security products are not immune to exploitation.




Added by jaideep khanduja on February 4, 2020 at 5:00pm — No Comments

Avast Shuts Down its Data Sales Subsidiary Due to Privacy Backlash

Avast was recently caught selling user's web browsing data.  Sensitive data like website destinations, search terms, and even what videos customers watched were collected by Avast software residing on customers' computers.  The data was repackaged and then sold by their Jumpshot subsidiary.  When the investigative reporting story became public, users…


Added by Matthew Rosenquist on February 1, 2020 at 8:28am — No Comments

More Challenges for Intel Hardware Product Security

New CPU Vulnerabilities Discovered

RIDL/ZombieLoad and L1DES/CacheOut are just the latest variants of vulnerabilities discovered in Intel CPU’s that target Micro-architectural Data Sampling (MDS) weaknesses. Discovered over 7 months ago, researchers responsibly informed Intel, and kept the information…


Added by Matthew Rosenquist on January 29, 2020 at 12:00pm — No Comments

Privacy Day - Yes it Matters More than You Might Think

Privacy Day promotes the fundamental principles of being able to control your personal information and to raise awareness of the risks in our digital society. The advancement and adoption of communication technology have elevated this issue to a worldwide problem. 

A casualty of the digital revolution has been our privacy.  In recent years,…


Added by Matthew Rosenquist on January 29, 2020 at 5:28am — No Comments

Time to Check and Change Your Avast Privacy Settings

Vice magazine recently reported that the Avast anti-virus company was harvesting their customer’s browsing data and selling it to other companies.  This included what sites, keyword searches, YouTube videos, and other data which showcased…


Added by Matthew Rosenquist on January 29, 2020 at 4:03am — No Comments

Five Security Best Practices For Kubernetes Deployments

Portshift introduces five security best practices for Kubernetes Deployments. Portshift is a pioneer in any kind of identity-based workload protection for cloud-native applications. The company has come out with five security best practices for DevOps and development experts who manage Kubernetes deployments across the globe. The key focus of these practices stays on integrating these security solutions into the CI/CD pipeline. This will help organizations in the identification and…


Added by jaideep khanduja on January 25, 2020 at 10:30am — No Comments

NAKIVO Releases Backup & Replication v9.1 Including Data Protection

NAKIVO releases its much-awaited Backup & Replication solution v9.1. The new release takes data protection to a new level. The backup functionality extends to the untouched zones. The new release adds support for backup to tape and Linux Server Backup. This would bring a sigh of relief to a large number of enterprises seeking this functionality for a long time. With the release of v9.1, the data protection touches a new height as the new functions include native backup to tape, physical…


Added by jaideep khanduja on January 25, 2020 at 8:00am — No Comments

Collaboration Makes Smart Cities More Secure

I am excited to join the development team for the U.S. National Institute of Standards and Technology (NIST) Smart Cities and Communities Framework (SCCF) with a focus on cybersecurity…


Added by Matthew Rosenquist on January 22, 2020 at 12:00pm — No Comments

2020 Report on State of Breach Protection by Cynet

Cynet today announced the State of Breach Protection 2020 Report. The report reveals significant concerns that security decision-makers need to look into immediately while designing their Breach Protection Plans for 2020. Cybersecurity is one of the major concerns stated in this report. It reveals that a large number of organizations are seriously charting out their advanced protection projects in 2020 on a priority basis. Most of those enterprises are trying to find out proactive protection…


Added by jaideep khanduja on January 21, 2020 at 9:02am — No Comments

Cyber Security for kids - Repository

[PPT] CYBER Safety Training For Young Students:…


Added by pritha on January 15, 2020 at 4:00pm — No Comments

What Google Is To Most Internet Users, Shodan Is To Hackers

What Google is to most internet users, Shodan ( is to hackers. It is a search engine for hackers to look for open or vulnerable digital assets. Shodan scans the entire internet and stores the open ports along with services running on all accessible ip addresses. It also provides a lot of…


Added by Allan Gray on January 14, 2020 at 2:00pm — No Comments

Zero Trust Model Presentation

Zero trust model presentation

  1. 1. #RSAC SESSION ID: Zero Trust Security Gowdhaman…

Added by Gowdhaman Jothilingam on January 7, 2020 at 3:30pm — No Comments

2019 Biggest Breaches: 2019 The “Worst Year On Record” For Breaches

According to research from Risk Based Security, the total number of breaches was up 33% over last year. That’s a whopping 5,183 data breaches for a total of 7.9 billion exposed records and in November, the research firm called 2019 the “worst year on record” for breaches…

Not having real time view of your dynamic attack surface and the risks it…


Added by pritha on January 7, 2020 at 2:00pm — No Comments

Digital Retaliation of Iran - Predicting the Next Evolution of Cyberwar

The United States and allies' national cyber response may soon be tested with the latest escalating conflict in the middle east. The U.S. conducted an airstrike that killed a revered Iranian general while in Iraq. This was in retaliation to a number of attacks against U.S. personnel and most recently the U.S. embassy in Iraq that was purported to be…


Added by Matthew Rosenquist on January 5, 2020 at 11:00am — No Comments

Banks are Developing Digital Currencies and Opening Themselves to Cyber Risk

Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.

Banks are developing their own digital currencies.  The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting trend that will change the cybersecurity dynamic for banking as it opens up an entirely new threat…


Added by Matthew Rosenquist on December 31, 2019 at 1:00pm — No Comments


Call for Comments

1. Need for NCSS 2020 India was one of the first few countries to propound a futuristic …

Added by CISO Platform on December 30, 2019 at 12:00pm — No Comments

The 7 Most Dangerous Digital Technology Trends

As our world embraces a digital transformation, innovative technologies bring greater opportunities, cost efficiencies, abilities to scale globally, and entirely new service capabilities to enrich the lives of people globally.  But there is a catch.  For every opportunity, there is a risk.  The more dependent and entrenched we become with technology…


Added by Matthew Rosenquist on December 27, 2019 at 4:58am — No Comments

Monthly Archives











© 2020   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service