What is Metasploit? And how to use this popular hacking tool
Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for both attackers and defenders.
J.M. Porup | 25 Mar | Read more
Metasploit is a penetration testing framework that makes hacking simple. It's an essential tool for both attackers and defenders.
J.M. Porup | 25 Mar | Read more
SoftNAS Cloud users should upgrade immediately following a report by Digital Defense that the virtual cloud appliance is vulnerable to a session management security issue.
J.M. Porup | 21 Mar | Read more
Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets.
J.M. Porup | 05 Mar | Read more
Google/Alphabet's Chronicle cybersecurity moonshot has a doozy of a mega-gargantuan SIEM with huge pluses--and minuses. Take note.
J.M. Porup | 05 Mar | Read more
The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.
J.M. Porup | 06 Feb | Read more
Defending critical infrastructure from determined attackers is not an easy task, CSO reporter J.M. Porup learned competing in the Department of Energy's CyberForce Competition 2018, a cyber security training initiative.
J.M. Porup | 17 Dec | Read more
A new APT, dubbed White Company, is flexing its muscle on the world stage, and it has security researchers worried.
J.M. Porup | 14 Nov | Read more
OWASP's Broken Web Applications Project makes it easy to learn how to hack web applications--a critical skill for web application developers playing defense, junior penetration testers, and security-curious management.
J.M. Porup | 09 Nov | Read more
White House promotion of an allegedly doctored press conference video shows how "shallow fakes" can manipulate opinion.
J.M. Porup | 09 Nov | Read more
Check Point researcher finds vulnerability that could have allowed attackers to spy on drone fleets in real time.
J.M. Porup | 09 Nov | Read more
Burning malware is like Hercules fighting the nine-headed Hydra. For every head he cuts off, two more grow back in its place.
J.M. Porup | 24 Oct | Read more
Everything is broken, and government and corporations like it that way. But when people start dying because of insecure cyberphysical systems, the overreaction from panicked policymakers could be worse than after 9/11.We need to solve this problem now, Bruce Schneier argues in his new book.
J.M. Porup | 03 Oct | Read more
Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.
J.M. Porup | 28 Sep | Read more
The extremes of despair and optimism are both dangerous to information security. What we need to do is to calm and assess the threats.
J.M. Porup | 26 Sep | Read more
Wireshark is a must-have (and free) network protocol analyzer for any security professional or systems administrator. It's like Jaws, only for packets.
J.M. Porup | 17 Sep | Read more