Post-COVID cyber trends been emerging from Threat Automation
During tough time for Covid19 pandemic, a lot of company should change the way of their running the business where some of the workers will need to do work from…
Security Awareness for all user
During tough time for Covid19 pandemic, a lot of company should change the way of their running the business where some of the workers will need to do work from…
When a configuration error for the online database has been exposed, 350 customer’s data have been leaked from a US-based VoIP provider. On 1st October 2020, unprotected ElasticSearch database cluster…
During October 2020 Microsoft’s patch, an security update have addressed a critical vulnerabilities that been resides within the Windows TCP/IP stack which called DNS RA options or also known as…
There is a Full Disclosure where I might think it will use for some system administrator to ensure their system been secure. Lately, Java Deserialization vulnerability has been found in…
Recently, An attack has occurred in Trend Micro Web Protection which take advantages of Punycode method which the vulnerability’s details can be seen as follow: CVE assigned: CVE-2020-25779 Platform affected:…
Recently, there is an outage happening within the Microsoft Cloud Service such Azure and Microsoft 365 that affecting all Microsoft’s user around the world. The issues are related to Azure…
After the first two botnets have been discovered which is BirckerBot and Silex, a new botnet has been found by Security Researcher from Netlab. The name of a new botnet…
For this post, I would like to share some knowledge that I just recently learn a few days ago. When I do some research on the tools, I notice that…
For this post, I would like to share a checklist of Cloud Security Assessment that will cover multiple areas of environment and business from cloud security best practice. Each assessment…
In this post, I would like to share knowledge and experience while doing Database Penetration Testing. The purpose of Penetration Testing is to find vulnerabilities within the system and simulate…