combatcyber

Latest posts

The real cost of a cyber breach at your company…..Do CEOs really know?

Consider the top five most significant expenses that a business has to manage after a breach.

Remediation

In 2017 the Ponemon Institute reported it takes more than six months for an organization to find out they have had an intrusion and another 55 days to contain it. Remediation does not necessarily mean the attack has been completely stopped, either, as some attacks remain dormant and undetected.

Loss of customers

I told you Crypto wasn’t safe

This week the news of more Cryptojacking were published, the more I saw people shaming others or gloating about how unsafe, unreliable crypto currencies are. I felt a strong desire to write about this in the blog and I will talk more about it in my podcast next week. (See CyberHub Engage).

But for this blog post I want to talk about Crypto Jacking and why it’s happening as often in a product that’s supposed to be “safe”.

What’s Cryptojacking?

Penetration Testing will save Countless Lives: The Cisco Vulnerability

Embedi researchers have this week uncovered a critical vulnerability in Cisco software that left Cisco employees and researchers sleep-deprived, until it was fixed. Researchers demonstrated this susceptibility at a Hong Kong based conference after reporting it to Cisco in May 2017 in a video demonstration. The affected hardware and software includes devices that fall into the Smart Install Client type.

How Secure is the BlockChain?

I want to start by asking you this very question? When you think of BlockChain what’s the first thing that come to your mind? (Comment Below)

            Survey is most likely to say Bitcoin and Crypto Currency. Why? That’s what we know it as. Recent trends I read, speak and discuss with others is BlockChain is also the safest technology out there. Its already safer than the technology out there today and it can’t be hacked.

            Let’s analyze this very statement. BlockChain is secure and can’t be hacked.

WEATHERING A CYBER ATTACK – A MAP THROUGH THE DIGITAL FRONTIER | BOEING, CITY OF ATLANTA – The latest casualties in ongoing cyber war

Distributed by Solution Road, Inc.

With top US and Israeli Cyber Experts in tow, Karin Zalcberg, CEO of CyberHub Summit and its partner, CyberHub Academy, says,” In the cyber-world, my clients don’t have the luxury of time to address their digital concerns and issues, “She continues, “Austin’s government and businesses move in real-time, and the hackers are moving even faster. Being prepared is essential to staying alive in business.”

Time to Panic? Potential Wi-Fi Security Breach Uncovered

This means that traffic shared over countless wireless networks globally will become an easy target for hackers and other malicious users looking to obtain sensitive information.

Biggest Internet Security Threat Ever?

Details of the latest vulnerability discovered in the WPA2 protocol have until this point not been shared with the public. The breach was discovered by the group of researchers who developed KRACK, pointedly spelled with a K and an acronym for Key Reinstallation Attacks.