First Sub Sahara Africa cyber security training, testing center set up

First Sub Sahara Africa cyber security training, testing center set up

Pan African cyber security consultancy firm Serianu has opened the doors of the first of its kind state-of-the -art Cyber Immersion Center. The training center targets cyber security professionals in Africa to hone their skills and ramp up their cyber-attack preparedness. The cyber range provides trainees with an opportunity to conduct realistic drills to test […]

Defence Secretary Gavin Williamson blames Putin for cyber attack as he claims Russia is ‘ripping up the rule book’

Defence Secretary Gavin Williamson blames Putin for cyber attack as he claims Russia is ‘ripping up the rule book’

RUSSIA has been accused of “ripping up the rule book” and “undermining democracy” by Gavin Williamson as Britain directly blames Putin for a cyber attack which spread across Europe last year. In more strong language from the Defence Secretary he says the Kremlin is “wrecking livelihoods by targeting critical infrastructure, and weaponising information”. Britain directly […]

North Korea Could Be Behind WannaCry Ransomware Cyber Attack

North Korea Could Be Behind WannaCry Ransomware Cyber Attack

The cyber attack has infected 3,00,000 computers in 150 countries Russia, Taiwan, Ukraine and India said to be most affected Less than $70,000 paid out by computer users to regain access Cyber security researchers have found technical evidence they said could link North Korea with the global WannaCry “ransomware” cyber attack that has infected more […]

Hacking: A Beginners’ Guide to Computer Hacking, Basic Security and Penetration Testing (A Guide to hacking wireless networks, python programming, engineering and Arduino testing Book 1)

Hacking: A Beginners’ Guide to Computer Hacking, Basic Security and Penetration Testing (A Guide to hacking wireless networks, python programming, engineering and Arduino testing Book 1)

buy now INR 320.00 Have you wondered what hacking is all about? How do people hack and what are some basic precautions you can take to prevent being hacked? Then read below:It seems like everyone is being hacked. Celebrities, politicians, large organizations, banks, schools, universities etc. Well, how does this happen? What are the different […]

Winter Olympics organizers say a cyberattack took down their computer servers during opening ceremonies, Business Insider

Winter Olympics organizers say a cyberattack took down their computer servers during opening ceremonies, Business Insider

caption A display from the 2018 Winter Olympics opening ceremony in Pyeongchang, South Korea. source NBC Sports Live The attack only affected “non-critical systems,” the organizers said. The cyberattack follows a string of previous incidents involving various Winter Olympics computer systems, including a spying operation that is believed to have originated from North Korea. Winter […]

Pentesting: a highly valuable tool for your company

Pentesting: a highly valuable tool for your company

It is essential, though far less common than it should be, to be aware of the risks that your company faces. To have a real grasp of the dangers to which you are exposed, there are certain tools that you need to understand and appreciate. Otherwise, you are probably underestimating the security holes that could […]

UK Government launches Cyber Security Export Strategy

UK Government launches Cyber Security Export Strategy

The UK Government has launched its Cyber Security Export Strategy. The strategy is contained in a 20 page document that can be downloaded free. There are over 800 companies in the UK who claim to be in the cyber security business. The vast majority of these are small consultancies. Between them they generated £1.5bn in […]

Sn1per v4.3 releases: Automated Pentest Recon Scanner • Penetration Testing

Sn1per v4.3 releases: Automated Pentest Recon Scanner • Penetration Testing

Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. FEATURES: Automatically collects basic recon (ie. whois, ping, DNS, etc.) Automatically launches Google hacking queries against a target domain Automatically enumerates open ports via NMap port scanning Automatically brute forces sub-domains gathers DNS info and checks […]