From a recent webinar, I gathered the very notably important parts into organized sub-parts. This is the first part wherein the major hardware threats and my insights on them are described. Below is the exact portion of the webinar discussing the ha
What Is Bad USB?
The phenomenon of using the USB for malicious intent can be termed as Bad USB. USB Thumb Drives are the last considerations of malicious intent. However, if manipulated, they can takeover almost everything.
Some interesting demonstra
There are four phases in Cyber Crisis Management, namely Detection, Response, Containment &amp; Recovery. Here is a glimpse of the four phases.
This is a cross post from original source at FireCompass here
This report summarizes the top breaches between mid May to mid June 2020 accounting for the major breaches the world has seen. This helps you in keeping track of the latest hacks and s
It appears France is the main victim for this recent attack which has several uncanny similarities to the SolarWinds exploitation that exposed thousands of U.S. government agencies, critical infrastructure organizations, and major businesses. Let me
Note: this page contains paid content.
Please, subscribe to get an access.