Cyber-Consult.org

Loading

  • Jul, Thu, 2023
  • 6 minutes Read
Transforming EU Cybersecurity: The Impact of NIS2 on Your Organisation

Over the past few years, a range of developments, including COVID-19, issues in Ukraine, cybersecurity threats, and the consequences of climate change, have increasingly jeopardized the safety of our society and economy. In light of these developments, the European Union has been working since 2020 on the Network and Information Security (NIS2) directive. The directive aims to enhance…

Read more
  • Jul, Thu, 2023
  • 2 minutes Read
Environment Variables: A Security Debate at PyCon Italia 2023

From the historic city of Florence, Italy, comes a new battle; not fought with swords, but with code and software architecture. The controversy surrounds the practice of using environment variables to store secrets in applications, which has been a topic of intense discussion at PyCon Italia 2023. Mackenzie Jackson, a developer advocate at GitGuardian, takes us through the…

Read more
  • Jul, Mon, 2023
  • 2 minutes Read
RVAsec 2023 – Virginia

RVAsec 2023, the largest cybersecurity conference in Virginia, convened security professionals to discuss key topics around improving our teams, chief information security officer (CISO) concerns, user security and more. The conference, held in Richmond, had 28 speakers addressing various aspects of security. Andy Ellis delivered a keynote on improving team leadership, emphasizing the six ways poor management destroys…

Read more
  • Jun, Wed, 2023
  • 2 minutes Read
Tracking Mobile Phone Locations Using Silent SMS Messages

A group of researchers have discovered a method to estimate a phone’s location with 96% accuracy by exploiting the vulnerabilities in GSMA networks, which handle SMS messaging globally. The process involves a side-channel attack using SMS delivery reports, which can provide a sender with estimates of the recipient’s location based on the timings of these messages. The attack…

Read more
  • Jun, Mon, 2023
  • 3 minutes Read
Banks Facilitating Criminal Hackers: A Growing Concern

In an era where technology has transformed the way we live, work, and conduct financial transactions, cybersecurity threats have grown exponentially. Criminal hackers, employing sophisticated techniques to exploit individuals and businesses, are thriving. A disturbing trend that has come to light is how established banking systems can inadvertently facilitate these activities.  Recently, a case involving Vitens, the largest drinking water supplier…

Read more
  • Apr, Mon, 2023
  • 1 minute Read
EvilExtractor Data Theft Tool on the Rise in Europe

Researchers have observed an increase in attacks deploying the EvilExtractor tool, a data theft software targeting sensitive user information in Europe and the U.S. Sold by Kodex for $59/month, the tool boasts seven attack modules, such as ransomware and credential extraction. Although marketed as legitimate, it’s primarily promoted to threat actors on hacking forums. Read more…

Read more
  • Apr, Mon, 2023
  • 1 minute Read
Limitations of Microsoft Excel in Automotive TARA Automation

Threat Assessment and Risk Assessment (TARA) is a critical process used by organizations to identify, assess, and prioritize potential risks. While many organizations rely on Microsoft Excel to automate TARA, it has significant limitations as the complexity of TARA increases. These limitations include: To overcome these challenges, organizations should consider adopting proper tools and best practices tailored to…

Read more
  • Apr, Sat, 2023
  • 1 minute Read
How-to guide: AWS security cheat sheet

Discover expert tips to bolster your #AWSSecurity and safeguard cloud workloads 🛡️! Learn about IAM policies, Control Tower, data protection, and more 🔒. #CloudSecurity #CyberRisk In this blog post, we discuss various security measures and best practices to protect your AWS environment from potential cyber threats. These include implementing AWS IAM policies and permissions, using AWS Control Tower,…

Read more
  • Apr, Fri, 2023
  • 1 minute Read
Hacker sells stolen Quran Karim Radio content to Arab countries

Hacker steals content from Egyptian Quran Karim Radio through piracy program, sells to Arab & Islamic countries. Police investigate the case as suspect operates the program from his residence in Nile Delta. #Egypt #QuranKarimRadio #Piracy #Hackers A hacker in Kafr el-Sheikh Governorate, Nile Delta, created a piracy program that allowed him to steal content from the Egyptian Quran…

Read more
  • Apr, Fri, 2023
  • 2 minutes Read
Modern Threat Vectors: Importance of Device-Centric Security

In today’s world, where work and personal computing are increasingly intertwined, it’s crucial to understand the importance of device-centric security. Traditional network-centric security models are becoming less effective as devices are used for various purposes, making them more vulnerable to threats. Colin Rand’s blog post discusses the potential dangers of blurring the lines between work and personal computing,…

Read more