-
How the VMWare ESXi Ransomware is Targeting Unpatched Systems
The recent wave of ransomware attacks targeting the old vulnerability in VMware ESXi (CVE-2021-21974) has sent shockwaves through the cybersecurity community. This bug, which has been publicly known for two years now, lies in the OpenSLP implementation in ESXi hypervisors, making it a prime target for attackers who can exploit it to gain remote code…
-
Blind SQL Injection (SQLi): Understanding and Exploiting Vulnerabilities in Web Applications and Databases
Blind SQL Injection attacks are a serious threat to web applications and databases. They exploit vulnerabilities in the software to gain unauthorized access to sensitive information. In this blog post, we will dive deeper into the topic of blind SQLi and discuss the most effective ways to prevent such attacks.
-
Mitigating the Risk of Credential Exposure
Over 60% of security breaches in the past year have been due to leaked credentials. What steps can you take to mitigate the risk?
-
Optus data breach: hacker blames company
On September 22, 2022 a security breach took place on Optus, the Australian telecommunications company compromising 9,800,000 customers. Approximately 38% of the country.
-
Network Security Infrastructure – keeping the baddies out.
How to protect and strengthen a networks security including hardware, software, and other strategies.
-
Hydra Brute Force Password Cracker Overview via TryHackMe
Hydra is used to brute force passwords. The goal is to crack a password by using a long list of potential passwords.