The White House’s new cybersecurity budget includes $3.1 billion
March 14, 2023
In the latest budget report, the White House has allocated $3.1 billion toward cybersecurity infrastructure. The report, published on Thursday, outlines the allocation of funds, with $145 million being designated to strengthen the Cybersecurity and Infrastructure Security Agency (CISA), making it…
0 Comments3 Minutes
According to IBM, ransomware persisted despite improved detection in 2022.
March 8, 2023
In a 2023 study, it was found that attackers’ most frequent action last year was installing backdoors that enable remote access to systems. Nearly 67% of these backdoor incidents were linked to ransomware attacks, and in many cases, the backdoor was detected by defenders before the ransomware…
0 Comments4 Minutes
NASA is performing a cyber security audit of the Deep Space Network tracking site.
March 2, 2023
A popular public website that tracks Deep Space Network (DSN) activity has been pulled offline for what NASA refers to as a “cyber security study” related to future Artemis missions. NASA’s long-running DSN Now website provides a graphical representation of DSN activity at its…
0 Comments4 Minutes
Despite fears of a recession, cybersecurity jobs are still secure.
March 1, 2023
A new study by (ISC)2, a cyber security certification group, found that cyber security professionals are likely to be better off than most other workers during an economic downturn. As corporate executives fear that a recession could lead to an increase in cyberattacks, they recognize the challenge…
0 Comments6 Minutes
Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux
February 28, 2023
Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux In this box, and using Kali Linux, the target computer has a weak access control vulnerability that allowed active user credentials to be harvested through FTP. The same credentials might be used to access a restricted…
0 Comments2 Minutes
Sequel – Hack The Box // Walkthrough & Solution // Kali Linux
February 28, 2023
Sequel – Hack The Box // Walkthrough & Solution // Kali Linux In the last video, we got a little experience with SQL injections using Kali Linux. We learnt how a web application may use a database of some kind to authenticate users and how it might be abused if not set correctly. In…
0 Comments1 Minute
Appointment – Hack The Box // Walkthrough & Solution // Kali Linux
February 28, 2023
Appointment – Hack The Box // Walkthrough & Solution // Kali Linux This box allows us to try conducting a SQL injection against a web application with a SQL database using Kali Linux. SQL Injection is a typical method of hacking web sites that collect and store user input data using…
0 Comments1 Minutes
Cybersecurity is moving forward with the help of AI Technology.
February 27, 2023
Researchers have made significant advances in using deep reinforcement learning (DRL), a type of AI Technology, to safeguard computer networks. In a rigorous simulation context, deep reinforcement learning has been shown to successfully prevent adversaries from achieving their goals against…
0 Comments8 Minutes
Exposed: The Insidious Linux Backdoors You Never Knew Existed // Kali Linux
February 25, 2023
Exposed: The Insidious Linux Backdoors You Never Knew Existed // Kali Linux Sneaky – Backdoors are secret pieces of code, scripts, or programs installed on a system for the main goal of maintaining persistence. They provide hackers with faster and more immediate access to the…
0 Comments1 Minutes
The Growing Role of AI in Supply Chain Management
February 23, 2023
With the increasing complexity of supply networks, more and more organizations are turning to artificial intelligence (AI) as a solution. According to a recent MHI survey, while only 17% of companies currently use AI, nearly 45% plan to integrate it into their supply chain by 2027. The survey…
0 Comments5 Minutes