Introduction Even though it’s not an old tactic for black hat hackers, Bitcoin scams have begun to be more and more prevalent, especially after the July 2020 hack, where 130 high-profile twitter accounts got compromised by outside parties. According to Wikipedia “more than 320 transactions had already taken place on one of the wallet addresses, […]
Cyberlink Security Blog
What does it take to build good pentest boxes to test cyber security skills?
Or ‘why we love building boxes’. If you are a pen tester (penetration tester), hacker or otherwise involved in the technical security of computers, chances are you have played one or more Capture the Flag competitions. Most conferences nowadays offer teams the opportunity to participate in a CTF, and sites like Vulnhub (http://vulnhub.com), TryHackme (http://tryhackme.com) […]
What am I protecting my cybers from? (part 1)
This blog post is, at least in my opinion, part of the most important piece of your cyber security strategy puzzle; your risk management. If you look at information security in general, and ISO27001 in particular, you always need to find that sweet spot that gives you the most protection for your money. Blindly following […]
What do I need to protect with cybersecurity?
In the previous posts we looked at why we need a cybersecurity strategy and what the scope of this strategy should be. Answering this question brings us automatically to the next, which is: What should we protect? This can be answered relatively easily by identifying your assets within the scope of your cybersecurity strategy. What has […]
Why are we seeing such high profile failures of cybersecurity?
How safe are we when the systems designed to save us fail? In the last few months a number of high impact vulnerabilities have been discovered in security perimeter equipment (i.e. security devices that are supposed to protect your internal network from the evils lurking on the Internet). Remember the vulnerabilities found in Citrix Netscaler, […]