bt_bb_section_top_section_coverage_image
5 tips to improve your privacy online

Users are keeping up on some challenges regarding data privacy. To keep your data private, here are 5 tips from Invisibly’s Head of Product Dr. Don Vaughn. Data privacy or information privacy is an area of data security concerned with the proper handling of sensitive data not only personal data but also other confidential data,...

What’s second-largest corporate network attacks in 2020 ?

Attackers are now increasingly taking advantage of emerging malware like crypto mining to target corporates, according to Crypto Parrot’s data. Hackers devise new methods to get into the systems of targeted parties. For the last few years, attackers are now increasingly taking advantage of emerging malware like crypto mining to target corporates. Cryptomining malware’s details...

Cisco Talos pinpoints vulnerability in Linux kernel

Cisco Talos researchers announced that they have discovered a vulnerability that could allow an attacker to view Kernel stack memory. The Cisco Talos team announced that they have discovered an information disclosure vulnerability in the Linux Kernel, which is the core of Unix-like operating systems. According to the announcement, the vulnerability specifically exists in the...

Kali Linux 2021.1 Download Kali Linux

Kali Linux 2021.1 Kali Linux has over 600 pre-installed penetration-testing programs, including Armitage (a graphical cyber attack management tool), Nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper password cracker, Aircrack-ng (a software suite for penetration-testing wireless LANs), Burp suite and OWASP ZAP web application security scanners. Kali Linux can run natively when...

How to install KaliLinux in VirtualBox

A brief introduction to Kali Linux What is KaliLinux? Kali Linux is an operating system designed and developed based on Debian and used for penetration testing. The good thing about this operating system is that it has more than 600 different tools for penetration testing. And is known as the most famous operating system with...

What is the SSH protocol and what does it do?

SSH stands for Secure Shell and is a secure protocol for communicating with other computers. This protocol is used to connect to Linux servers and because of this ability to manage the server remotely and securely. SSH protocol history The SSH protocol was invented in 1995 by Mr. Tatu Ylönen, whose image can be seen...

New version of pfSense Plus and pfSense CE are now available

Netgate announced the release of pfSense Plus software version 21.02 and pfSense Community Edition software version 2.5.0. Netgate announced that pfSense Plus software version 21.02 and pfSense Community Edition software version 2.5.0 are now available for upgrades and new installations. This is the first release of pfSense Plus software, formerly known as Factory Edition. Users...

Critical bug in sudo puts Linux and Unix systems at risk

Any logged-in unprivileged user can abuse an old bug in sudo to gain root privileges. It was rated as an important security issue for Linux and Unix-like operating systems. The Qualys research team has discovered the heap overflow vulnerability in sudo itself has been hiding in plain sight for nearly 10 years. The bug allows...

The top 7 cyber security protocols

Focusing on cyber security protocols to protect privacy and data became a need with the rise of cyber attacks. Here are the seven protocols that are essential for security professionals. With the COVID-19 pandemic, the cyber-attacks have diversified, and data security is getting more important. Therefore, companies need to focus on cybersecurity protocols to protect...

Protecting a web server and the data is the top priority for all system administrators. Here are some tips and tricks to protect your server against malware. There is an everlasting battle between malware and security software. Both sides are always evolving, improving, and creating new methods. With some basic steps, you can protect your...