Phishing Types & Techniques

In the early days, phishing had begun with mass emailing to reel in potential victims. This attack type generally produced fair results considering it only took a couple victims to make a few seemingly harmless clicks out of hundreds or even thousands of others. As phishing attacks and types have progressed, the majority of the

Read More »

Breaking WPA2 Security – KRACK

A recent weakness has been discovered in the WPA2 Wi-Fi protocol. Attackers are using a method called KRACK (Key Reinstallation Attack) to exploit the weakness on a wide range of devices. The attack works against all WPA2 Wi-Fi protected networks and can even lead to data injection and manipulation. This poses a serious threat as

Read More »

Exploiting & Patching: EternalBlue

The recent WannaCry & Petya ransomware utilize the EternalBlue exploit to own machines and load malware. EternalBlue is a remote code exploit targeted at a vulnerability in SMBv1 and NBT over TCP ports 445 and 139. SMB provides support for what are known as SMB Transactions. Using SMB Transactions enables atomic read and write to

Read More »

Benefits of Content Filtering

Content filtering helps to filter acceptable content for viewing and accessing. The system administrator decides upon which content is acceptable or unacceptable for viewing and or accessing. When content filtering is correctly implemented, it can restrict users from accessing websites that are NSFW (not safe for work) and allow access to desired sites.  This policy

Read More »
krack-attack-100738914-orig

Breaking WPA2 Security - KRACK

A recent weakness has been discovered in the WPA2 Wi-Fi protocol. Attackers are using a method called KRACK (Key Reinstallation Attack) to exploit the weakness on a wide range of devices. The attack works against all WPA2 Wi-Fi protected networks and can even lead to data injection and manipulation.

EternalBlue

Exploiting & Patching: EternalBlue

The recent WannaCry & Petya ransomware utilize the EternalBlue exploit to own machines and load malware. EternalBlue is a remote code exploit targeted at a vulnerability in SMBv1 and NBT over TCP ports 445 and 139. SMB provides support for what are known as SMB Transactions.

iconWebContentBlocking

Benefits of Content Filtering

Content filtering helps to filter acceptable content for viewing and accessing. The system administrator decides upon which content is acceptable or unacceptable for viewing and or accessing. When content filtering is correctly implemented, it can restrict users from accessing websites that are NSFW (not safe for work) and allow access to desired sites.