EHA
ABCs of Information Security

ABCs of Information Security – An Employee’s Security Awareness Guide – 2023

With ABCs of information security awareness, we can reduce the risk of losing private information, money, or reputation from cyberattacks. Here we detail the risks involved and prevention. Information security or InfoSec describes the processes and tools designed...
Main Reasons Why Security Testing Is So Important For Businesses

Main Reasons Why Security Testing Is So Important For Businesses

If you run an e-commerce business or work in a highly regulated industry like banking, healthcare, insurance, or telecommunication, security testing is critical to ensuring the integrity and security of your apps. Suppose you...
BlueNoroff

BlueNoroff APT Hackers Using New Technique to Evade Windows MotW Flag Warning

One of the sub-clusters of the notorious Lazarus Group, BlueNoroff, has been observed by the researchers at Kaspersky to be turning to new techniques in order to bypass the protections that are put into...
SSL Stats: Why is an SSL Certificate So Important for Your Website?

SSL Stats: Why is an SSL Certificate So Important for Your Website?

SSL certificates are no longer considered a necessity only for large companies. Every website, big or small across industries, needs SSL protection today. SSL stats will tell you how SSL adoption has become almost...
Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2023

Top 12 Best Open Source Intelligence Tools (OSINT Tools) for Penetration Testing 2023

We all know very well that getting or gathering any information by using various tools becomes really easy. In this article, we have discussed various OSINT tools, as if we search over the internet,...
StormWall’s New Point of Presence in Singapore Brings DDoS Protection to APAC

StormWall’s New Point of Presence in Singapore Brings DDoS Protection to APAC

StormWall, a cybersecurity service that specializes in providing DDoS protection for IT infrastructures of all sizes and complexity, including websites, networks, and online services, today announced the opening of its sixth point of presence...
Red and Blue Team

Red Team and Blue Team Operations : How Does it Works?

Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red team and the blue team in security. First things first: why do...
How to Effectively Handle Data Security During Pentest?

How to Effectively Handle Data Security During Pentest?

A lot of data is generated during pentest engagements: vulnerabilities, open ports, vulnerable IPs… Soon enough, it gets tough to keep everything tracked.  What kind of data is this? Let’s take a look at the...
Cybersecurity Takeaways

Key Cybersecurity Takeaways from 2022

2022 was a noteworthy year in cybersecurity. We saw a steady rise in cybercrime, continuing the trend from previous years. But we also saw a greater variety of anti-cybercrime measures, including significant cybersecurity budget...
Ping Vulnerability

Critical Ping Vulnerability Let Hackers Take Over FreeBSD Systems Remotely

A critical vulnerability in the FreeBSD operating system's ping module allows Attackers to execute an arbitrary code and take over the system remotely. Developers of the operating system recently released security updates. CVE-2022-23093 has...