-
How Simulation Training is becoming an Integral part of Cyber Preparedness. (Recorded Webinar)
- June 13, 2020
- Posted by: Edem Glymin
- Category: Information Security, Intelligence
No CommentsDefining and testing a cyber incident response plan is a highly effective way of reducing the impact and duration of a real cyber incident. Detect and respond to cyber incidents in line with your organisation’s response plan, based on simulated attacks that use similar technologies to those deployed in real attack scenarios. These simulation exercises
-
COVID-19 | The Cybersecurity Effect of the Pandemic
- April 24, 2020
- Posted by: Edem Glymin
- Category: Information Security
By: Edem Glymin, Lead security and risk consultant for Global Secure Solutions Ghana Limited. How did we get here? Suddenly the world as we knew it came to a grinding halt and tottered on the brink of despair. In a swift moment our sanity became questioned, our livelihoods and freedom of movement threatened by an
-
Hackers Are Selling a Critical Zoom Zero-Day Exploit for $500,000
- April 24, 2020
- Posted by: Edem Glymin
- Category: Data Security, Risk Management
By Lorenzo Franceschi-Bicchierai , Source: Motherboad, Tech by VICE Hackers are selling two critical vulnerabilities for the video conferencing software Zoom that would allow someone to hack users and spy on their calls, Motherboard has learned. The two flaws are so-called zero-days, and are currently present in Zoom’s Windows and MacOS clients, according to three
-
Vietnam-linked hackers targeted Chinese government over coronavirus response: researchers
- April 24, 2020
- Posted by: Edem Glymin
- Category: Data Security, Information Security
By: Jack Stubbs, Raphael Satter Additional reporting by Muyu Xu in Beijing and James Pearson in Hanoi; Editing by Richard Chang Source: Reuters LONDON/WASHINGTON (Reuters) – Hackers working in support of the Vietnamese government have attempted to break into Chinese state organisations at the centre of Beijing’s effort to contain the coronavirus outbreak, U.S. cybersecurity
-
Delta Reports $534 Million Loss For First Quarter And Details Grim Outlook
- April 24, 2020
- Posted by: Edem Glymin
- Category: Business Analytics
-
Understanding SIM Card Forensics
- April 9, 2020
- Posted by: Edem Glymin
- Category: Uncategorized
By: Rohit Shaw Source: eforensicsmag References http://www.forensicmag.com/articles/2011/04/sim-forensics-part-1 http://www.infosecinstitute.com/courses/mobile-computer-forensics.html https://www.visualanalysis.com/ProductsVA_SIMpull.aspx http://csrc.nist.gov/groups/SNS/mobile_security/documents/mobile_forensics/Reference%20Mat-final-a.pdf The SIM (subscriber identity module) is a fundamental component of cellular phones. It’s also known as an integrated circuit card (ICC), which is a microcontroller-based access module. It is a physical entity and can be either a subscriber identity module (SIM) or a universal integrated
-
CSI: Evidence Indicators for Targeted Ransomware Attacks
- April 9, 2020
- Posted by: Edem Glymin
- Category: Uncategorized
-
U.S. Charges 4 Chinese Military Officers in 2017 Equifax Hack
- April 9, 2020
- Posted by: Edem Glymin
- Category: Data Security, Information Security, Intelligence
Source: krebsonsecurity The U.S. Justice Department today unsealed indictments against four Chinese officers of the People’s Liberation Army (PLA) accused of perpetrating the 2017 hack against consumer credit bureau Equifax that led to the theft of personal data on nearly 150 million Americans. DOJ officials said the four men were responsible for carrying out the
-
Practical Web Cache Poisoning
- April 9, 2020
- Posted by: Edem Glymin
- Category: Uncategorized
-
Zero-day attacks: Protections, best practices and how to implement them
- April 9, 2020
- Posted by: Edem Glymin
- Category: Information Security, Risk Management, Threat Intelligence
Sources: InfosecInstitute Zero-day (0day) exploit, Imperva Cybersecurity: How to get your software patching strategy right and keep the hackers at bay, ZDNet Five Key Capabilities To Look for in a Managed Web Application Firewall (WAF) Provider, GBHackers on Security Introduction Zero-day attacks are one of the most dangerous cybersecurity threats. This type of
Contact Global Secure Solutions by completing our online feedback form.