Author: admin
-
Boston Pentest & Cybersecurity
Massachusetts, a vibrant hub of technology and innovation, has not remained untouched by the growing threat landscape of cybersecurity breaches – the proverbial Boston pentest. In recent years, the state has witnessed several high-profile incidents that emphasize the critical importance of robust security measures. This article will extensively delve into the top cybersecurity breaches that…
-
Securkey – 1st Password Manager
The mid-1990s brought about a pressing need for secure and convenient password management solutions. As the use of the internet surged, users grappled with an increasing number of passwords, leading to vulnerabilities in security practices. This article delves into the origins, functionalities, and enduring impact of the first password manager tailored explicitly for modern desktops…
-
Massachusetts Cybersecurity & Networking
Massachusetts, renowned for its technological prowess, and all it’s encompassing companies, have emerged as a powerhouse in the field of Massachusetts cybersecurity. In this digital age, where the integrity of networks and the protection of sensitive information are paramount, the state has become a breeding ground for innovative cybersecurity solutions. This article delves into the…
-
Evolution of Cybers: Network Pentesting
This post will delve on 17 technologies that changed network pentesting in the past 24 years, since I was addicted to the internet basically. Here are the list of the 17 tech’s that have changed the landscape for both offensive and defensive cybersecurity practictioners. As a prelude of course, I first have to say that…
-
17 att&ck Threats: Network Pentest Approach
One effective framework for comprehending and addressing these threats is the MITRE ATT&CK matrix. In this discussion, we’ll explore 17 techniques from the matrix and delve into how a network pentest can be instrumental in preventing and mitigating such threats. Personally, I think the best examples of the att&ck framework can be found on hybrid-analysis.com.…
-
17 Top Tech Companies in New England
This is a short list of 17 top tech companies in New England. Several of these began as start-ups, and many of them were big-tech companies before the rise of tech as an industry in New England. Not all of them are located in Massachusetts, but a good amount are. If you’re looking to learn…
-
17 Dorks & Network Pentesting Reconaissance
Network penetration testing, an essential facet of cybersecurity, involves a meticulous process to identify and mitigate vulnerabilities within a network, and this is my post on network pentesting reconaissance with common Google dorks. Do note that this is only common Google dorks, the best ones, I actually use to help me secure my business growth!.…
-
17 Breaches – Internal Network Pentest Could Have Prevented
Date Company How Breached Company URL News Article 2013-12-19 Target Malware on Point-of-Sale systems Target Target Data Breach – CNBC 2014-09-02 Home Depot Malware in point-of-sale systems Home Depot Home Depot Confirms Breach – KrebsOnSecurity 2017-09-07 Equifax Exploited a vulnerability in website software Equifax Equifax Data Breach – The Guardian 2013-12-21 Adobe Cyber-attack, exposed user…
-
17 Encryption Algorithms In Network Pentests
This is a comprehensive list of the 17 top encryption algorithms found in network pentests. No. Encryption Algorithm URL Description 1 AES (Advanced Encryption Standard) NIST – AES AES is a symmetric encryption algorithm widely used for securing sensitive data. Its strength lies in its efficiency and security, making it a standard choice for various…