What caused the outage of Facebook, Messenger, Instagram, and WhatsApp?

The problem that occurred to Facebook is not the same that happened to Instagram. The main problem behind the Facebook outage is the de-announcement of their Border Gateway Protocol (BGP) from its international Domain Name System (DNS). In other terms, once you type facebook.com, you should be redirected to Facebook server IPs. On Monday, October… Continue reading What caused the outage of Facebook, Messenger, Instagram, and WhatsApp?

Social Engineers are creative, avoid their tricks !

Universally Social Engineering is classified as the most deceitful and manipulative type of hacking and scamming. Social engineering techniques are usually used to deliver malicious software, but in some cases only form part of an attack, as an enabler to gain additional information, commit fraud or obtain access to secure systems. Social engineers are creative,… Continue reading Social Engineers are creative, avoid their tricks !

Safari Zero-Day Used in Malicious LinkedIn Campaign

CHIANG MAI ,THAILAND - May 10, 2020 : LinkedIn login page in a laptop screen. LinkedIn is a social networking website for service that operates website with people in professional occupations.

Threat actors used a Safari zero-day flaw to send malicious links to government officials in Western Europe via LinkedIn before researchers from Google discovered and reported the vulnerability.

Published
Categorized as News

Windows Server 2022 in Review

Font update with update process in the background when configuring the computer

The Windows Server 2022 will be available before the end of 2021, primarily bringing the concept of Secure Core from Windows client to the server world with Secure Core Servers combining the Windows Containers improvements.

What is a Compromised Assessment Test?

A Compromise Assessment Test is a hunting test for suspicious activities on every layer of the suspected network to detect unknown security breaches, malware, and signs of unauthorized access. More specifically, the assessment seeks to find attackers currently in the environment or who have been active in the recent past.