Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

How to Backup Active Directory: A Step-by-Step Guide

Microsoft Active Directory (AD) is the primary authentication service used by a majority of organizations worldwide (roughly 90 percent). It stores critical business information on domain controllers (DCs) like user accounts, their permissions, the number of computers in your organization’s network, etc. In other words, it’s critical infrastructure. However, many businesses still don’t understand just how important it is to back up Active Directory.

Uncovering the Polyfill.io Supply Chain Attack

In this video, we will be uncovering how a sneaky supply chain attack on the JavaScript Polyfill.io service compromised websites across the globe, including big names like Intuit, Square, the U.S. government and more. Stay tuned to find out how the attack occurred and what you can do to prevent it!

Making Sense of NIS 2: Adopt a Cybersecurity Blueprint like NIST to Set Your House in Order

In 2023, the European cybersecurity landscape painted a concerning picture. According to a report in detection, response, and mitigation further emphasized that enterprise cybersecurity implementations were falling short.

Playing Around with AWS-Vault for Fun & Profit

AWS-Vault is an excellent open-source tool by 99Designs that enables developers to store AWS credentials in their machine keystore securely. After using it for a while at Jit, I decided to dig deeper into how it works and learned a lot along the way. In this article, I will summarize and simplify the information I learned to help others with their aws-vault adoption and lower the barrier to usage.

How to Conduct Comprehensive People Searches and Background Checks

In today's interconnected world, finding someone or learning more about their background has become a necessity for various reasons. Whether it's reconnecting with long-lost friends, verifying an online date's identity, or ensuring your new neighbor's credibility, conducting a comprehensive people search and background check is crucial. This process, however, can seem daunting given the plethora of information available online. To streamline your efforts and ensure accurate results, tools like CocoFinder have emerged as invaluable assets.

CVE-2024-6387: New OpenSSH RegreSSHion Vulnerability Gives Hackers Root Access on Linux Servers - 700,000+ Linux Boxes Potentially at Risk

Labeled as CVE-2024-6387, the recently discovered vulnerability in OpenSSH has become a serious cause for concern among Linux servers. OpenSSH is a collection of networking tools built on the Secure Shell (SSH) protocol. It is widely utilized to secure remote logins, manage and administer remote servers, and transfer files through SCP and SFTP. Nicknamed as the “RegreSSHion Bug”, Researchers at Qualys initially identified the vulnerability in May 2024.

Why Are Personal Alarms Your Ultimate Defense Companion?

As concerns about safety and our well-being increase, it's crucial to have effective self-defense tools at your disposal to protect yourself and those around you. Carrying a safe personal alarm is a great option to improve your security. Whether you're facing a threatening encounter or need assistance in a public space, having this safety tool within reach can make all the difference. Let's find out why these little gadgets are becoming so popular and how they can be your ultimate defense companion.

Learn about the top five types of cyber security

In today's digitally-driven world, safeguarding sensitive information is more crucial than ever. As cyber threats become increasingly sophisticated, understanding the different facets of cybersecurity is essential for individuals and organizations alike. In this blog, we'll delve into the top five types of cybersecurity measures that form the backbone of a robust defense strategy. From network security to cloud security, each type plays a pivotal role in protecting data, ensuring privacy, and maintaining the integrity of systems against malicious attacks.

Build the foundation for airport networks with centralized DDI solutions

As airports embark on their digitalization journeys, the significance of connectivity is more pronounced. For an airport to function as a global aviation gateway, connectivity is no longer a mere utility but a strategic asset, crucial to its operations, much like its runways.