SingHealth cyber-attack: now what?

SingHealth cyber-attack: now what?

Last Friday, authorities broke the news that hackers had infiltrated the databases of SingHealth, the largest group of healthcare institutions in Singapore. The worst cyber-attack to be inflicted in Singapore, the hackers walked away with the personal data of about 1.5 million patients, including data belonging to Prime Minister Lee Hsien Loong and a few […]

Why Cyber Security is Important

Why Cyber Security is Important

October is National Cybersecurity Awareness Month (NCSAM). A collaboration between the US Department of Homeland Security and the National Cyber Security Alliance, the NCSAM initiative has been working for 15 years to raise awareness about the importance of cybersecurity for the public and businesses alike. According to the Center for Internet Security, a non-profit working […]

Almost 60% of Scottish Councils Hit by Cyber Attacks – Cyber Security Helpdesk Limited – UK Cyber Incident Reponse Specialists

Almost 60% of Scottish Councils Hit by Cyber Attacks – Cyber Security Helpdesk Limited – UK Cyber Incident Reponse Specialists

Some local authorities reported being bombarded with thousands of spam emails and receiving ransom demands to decrypt data. Freedom of Information requests showed 19 of Scotland’s 32 councils experienced either attempted or successful attacks since 2014. Ransomware attacks were reported by 14 local authorities, sometimes on multiple occasions. Four councils refused to reveal any information, […]

BAS and Red Teams Will Kill The Pentest

BAS and Red Teams Will Kill The Pentest

With our research on testing security methods and Breach and Attack Simulation tools (BAS), we ended up with an interesting discussion about the role of the pentest. I think we can risk saying that pentesting, as it is today, will cease to exist (I’ll avoid the trap to say “pentesting is dead”, ok? :-)). Let […]

How to Set Up a Web App Pentesting Lab in 4 Easy Steps

How to Set Up a Web App Pentesting Lab in 4 Easy Steps

A pentesting lab can be a small entity used by one security tester, consisting of one or two computers; or it could be a larger set of networked computers behind a closed or secured network, used by a group of security testers. Step 1: Assess Pentesting Needs Before creating a pentesting lab, it is important […]

Pentest Tools and News

Pentest Tools and News

BYOB – Build Your Own Botnet , , , , , post exploitation, , , , Disclaimer: This project should be used for authorized testing or educational purposes only. BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of […]

FDA Beefs Up Cyber Security Measures To Protect Patients

FDA Beefs Up Cyber Security Measures To Protect Patients

FDA To Strengthen Cyber Security Program For Medical Devices Most of us own computers and cell phones, and as such, have been threatened with viruses, malware and other attacks. In the past, hackers have raged war on individuals as well as large corporations such as government agencies, movie studios and banks. Now, healthcare entities are […]

What are the most common cyber attack?

What are the most common cyber attack?

Cyber crime is at an all-time high, and at the same time as organizations are trying to counter these attacks, criminal hackers are becoming more innovative with the different types of cyber attacks they are choosing to deploy. What is a cyber attack? Cyber attacks are deliberate and malicious. They are attempts to breach the information or information systems of individuals or organizations. The following list points out the six most […]