Adobe ColdFusion Vulnerability

Adobe ColdFusion Vulnerability Exploited in the Wild

Based on evidence of active exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Adobe ColdFusion to its Known Exploited Vulnerabilities (KEV) list on March 15. CVE-2023-26360 (CVSS rating: 8.6) is the primary weakness in question, which…


0 Comments2 Minutes

cybersecurity budget

The White House’s new cybersecurity budget includes $3.1 billion

In the latest budget report, the White House has allocated $3.1 billion toward cybersecurity infrastructure. The report, published on Thursday, outlines the allocation of funds, with $145 million being designated to strengthen the Cybersecurity and Infrastructure Security Agency (CISA), making it…


0 Comments3 Minutes

ransomware

According to IBM, ransomware persisted despite improved detection in 2022.

In a 2023 study, it was found that attackers’ most frequent action last year was installing backdoors that enable remote access to systems. Nearly 67% of these backdoor incidents were linked to ransomware attacks, and in many cases, the backdoor was detected by defenders before the ransomware…


0 Comments4 Minutes

Deep Space Network

NASA is performing a cyber security audit of the Deep Space Network tracking site.

A popular public website that tracks Deep Space Network (DSN) activity has been pulled offline for what NASA refers to as a “cyber security study” related to future Artemis missions. NASA’s long-running DSN Now website provides a graphical representation of DSN activity at its…


0 Comments4 Minutes

cybersecurity jobs

Despite fears of a recession, cybersecurity jobs are still secure.

A new study by (ISC)2, a cyber security certification group, found that cyber security professionals are likely to be better off than most other workers during an economic downturn. As corporate executives fear that a recession could lead to an increase in cyberattacks, they recognize the challenge…


0 Comments6 Minutes

Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux

Crocodile – Hack The Box // Walkthrough & Solution // Kali Linux In this box, and using Kali Linux, the target computer has a weak access control vulnerability that allowed active user credentials to be harvested through FTP. The same credentials might be used to access a restricted…


0 Comments2 Minutes

Sequel – Hack The Box // Walkthrough & Solution // Kali Linux

Sequel – Hack The Box // Walkthrough & Solution // Kali Linux In the last video, we got a little experience with SQL injections using Kali Linux. We learnt how a web application may use a database of some kind to authenticate users and how it might be abused if not set correctly. In…


0 Comments1 Minute

Appointment – Hack The Box // Walkthrough & Solution // Kali Linux

Appointment – Hack The Box // Walkthrough & Solution // Kali Linux This box allows us to try conducting a SQL injection against a web application with a SQL database using Kali Linux. SQL Injection is a typical method of hacking web sites that collect and store user input data using…


0 Comments1 Minutes

Cybersecurity is moving forward with the help of AI Technology.

Researchers have made significant advances in using deep reinforcement learning (DRL), a type of AI Technology, to safeguard computer networks. In a rigorous simulation context, deep reinforcement learning has been shown to successfully prevent adversaries from achieving their goals against…


0 Comments8 Minutes

Exposed: The Insidious Linux Backdoors You Never Knew Existed // Kali Linux

Exposed: The Insidious Linux Backdoors You Never Knew Existed // Kali Linux Sneaky – Backdoors are secret pieces of code, scripts, or programs installed on a system for the main goal of maintaining persistence. They provide hackers with faster and more immediate access to the…


0 Comments1 Minutes