Posts From Shah Sheikh

Windows will be removing SMBv1 (Server Message Block version 1) from the upcoming windows 10 (1709) Redstone 3 Update. SMBv1 is one of the ancient networking protocols that allows the operating systems to read and write data to a system

A vulnerability has been detected in several Unix-based operating systems- Linux, OpenBSD, NetBSD, FreeBSD and Solaris- the vulnerability allows for privilege escalation. The vulnerability A stack is a memory region where you can store short-term data. With limited space available

NSA GitHub

  National Security Agency (NSA) has officially joined GitHub and has launched an official GitHub page. GitHub is an online repository where you can share source code for a lot of applications and services. NSA will be sharing 32 different

According to a new report that was released, 77% of global ransomwares were detected to be in four sectors. Retail (15%), healthcare (15%), government (19%) and business & professional services (28%). Moreover, the GTIR (Global Intelligence Threat Report) by NTT

Quantum Cryptography

Quantum computers have been discussed a lot recently. Many questions of when will they be commercially available have been going around although we still do not release understand the quantum world. However, cryptography has been a huge issue because of

Erebus Ransomware

NAYANA, a South Korean web hosting company, was recently attacked by a ransomware dubbed Erebus which took down 143 Linux servers and 3480 websites across the globe. A large price of 10 bitcoins was asked but it got reduced to

The year of 2016 experienced a lot of cyber-attacks including the large cyber-attack on Yahoo, where over 1 billion accounts were compromised. Consequently, Verizon asked for a discount before acquiring Yahoo due to the cyber-attack and that any further damage

In May 2017, an updated version of WannaCry ransomware struck a minimum of 200,000 organizations in over 150 countries. It did so by abusing a Windows SMB vulnerability (MS17-010) using exploit code developed by the NSA and leaked online by

Bitfinex, the world’s largest US dollar-based Bitcoin exchange, is still suffering from the effects of a DDoS attack on its systems earlier this week, rendering IOTA deposits unavailable for users. The exchange first tweeted it was under attack on Tuesday,

It won’t come as a surprise to anyone working in corporate IT that not all security threats come from unknown hackers in Russia or Indonesia (or the USA, for that matter). It’s also necessary to protect from threats posed by

As the global digital economy grows, the number of digital identities rises, and so does the need to protect and manage how personal information is collected, used and distributed. Managing digital identities is key in the online world and finding

Extracted from a podcast by Tim White, Director of Product Management, Policy Compliance at Qualys, who talks about regulatory compliance trends that across a variety of different regions in the world, as well as strategies for dealing with them. Compliance,

Linux Ransomware

Nayana, a South Korean web hosting company, was hit by a ransomware where 153 Linux servers and over 3,400 business websites hosted by the company were affected. Nayana posted on June 12 that the attackers have demanded for 550 Bitcoins

CherryBlossom

WikiLeaks has recently published a document on a tool used by the U.S Central Intelligence Agency (CIA) to hack routers and access points as part of their ongoing operation of Vault 7. Vault 7 includes all the covert global hacking

Nigerian scams have been going on for a while in recent years, making the public generally aware of them. Recently, they have been targeting large industries, hitting 500 companies in 50 countries using BEC (Business E-mail Compromise). Cost estimates, network

Mozilla Firefox, one of the most popular web browser used across the globe has recently released a patch to fix 32 vulnerabilities in Firefox 54, the latest flagship of the browser. One of the bugs that were fixed was a