security awareness

  1. CVE-2024-38223: Elevation of Privilege Vulnerability in Windows Explained

    As Windows users, staying informed about security vulnerabilities is crucial to ensure the safety and integrity of our systems. Recently, a significant vulnerability identified as CVE-2024-38223 was published, indicating an elevation of privilege issue linked to the Windows Initial Machine...
  2. Understanding CVE-2024-38173: Microsoft Outlook RCE Vulnerability Explained

    Overview of the Vulnerability The recent identification of CVE-2024-38173, a Microsoft Outlook Remote Code Execution Vulnerability, emphasizes the importance of regular software updates and security vigilance. Though detailed technical information regarding this vulnerability may not be...
  3. Indicators of a Phishing/Social Engineering Email #1

    I thought it might be fun and informative to start a series on real phishing emails and calling out the indicators of why they are suspicious. One of my old email addresses has been in a lot of data breaches so it tends to receive a lot of spam and phishing emails. Without further ado here is...
  4. NEWS The 'Joker' Virus: Everything You Need To Know – Updated December 2021

    The ‘Joker’ virus has been around since 2017, it has been a recurring thread to Android OS to this day. You’ve probably heard of this virus on more than one occasion. Considering that it surfaced two times in the last couple of months, we’ve decided to give you more detailed information about...
  5. AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

    Original release date: December 1, 2020<br/><h3>Summary</h3><p class="tip-intro" style="font-size: 15px;"><em>This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK®) framework. See the <a href="Techniques - Enterprise | MITRE ATT&CK®">ATT&amp;CK for...
  6. VIDEO ICYMI – Recapping Microsoft Edge at Ignite 2020

    October is National Cybersecurity Awareness month (NCSAM) and it couldn’t be more timely. Vulnerability to online threats is literally top of mind for everybody. In a Link Removed, 90% of respondents (yes, you read that right) indicated that phishing attacks have impacted their organizations...
  7. Analysis of Malware Spread Via Email

    If you're not familiar with ISC (Internet Storm Center) and you're interested in cyber security or just want to learn about malware, attack vectors and how they work check them out here. They do a lot of malware break downs as well as other cyber security related articles (threat trends, useful...
  8. Cybersecurity and Data Protection: Learning the New Rules

    Sponsored by: KeepItSafe - Date: Thursday, 12/14/17 at 2:00 PM EST Continue reading...
  9. Tor Browser Experiment

    So just thought I'd share that I'm going to use Tor browser for 30 days on my laptop and phone :nerves: I want to see if I can do all the usual web surfing and use the same services I'd normally use with Firefox of Chrome. And maybe I can post my questions about any problems I might encounter...
  10. Some interesting stats in the wake of WannaCry

    Really wanted to share these with the WF community :) I'm proud of our team and our threat intelligence labs; in the end, we blocked over 1,000,000 WannaCry attempts. That was across 350 variants in 150 countries around the world. it's just a fraction of what we block every day though; on an...
  11. An update from the Avast Threat Labs on WannaCry

    Jakub Kroustek from the Avast Threat Labs has written a nicely detailed blog on the aftermath of WannaCry -- what some are calling the worst ransomware outbreak in history. We're proud to have kept over 250,000 Link Removed users protected during the outbreak; our threat labs also urge user...
  12. Security Awareness Training

    I just wanted to post a link to security awareness training videos from a great site Cybrary.it. I think everyone should go through the modules once a year for the average user. Link Removed Enjoy and be a safe cyber citizen.
  13. Windows 7 How To Respond To A Denial Of Service Attack.

    How To Respond To A Denial Of Service Attack -- InformationWeekHow To Respond To A Denial Of Service Attack - security Blog
  14. Windows 7 How phone hacking worked and how to make sure you're not a victim

    How phone hacking worked and how to make sure you’re not a victim | Naked Security
  15. Windows 7 Interesting Info about Fake Antivirus Programs!!!

    Hi Some interesting stuff here about how to avoid and remove fake antivirus Trojans. Link Removed Mike
  16. Windows 7 Fake Receipt Program Targets Amazon Retailers

    Amazon retailers are being targeted by fraudsters who have created a custom-built a program that generates fakes receipts for nonexistent orders, according to researchers from GFI Software. he program is designed to create a customized HTML file that closely resembles an actual Amazon.com...