Security

How to Counter and Mitigate DDoS Attacks - Complete Guide
How to Counter and Mitigate DDoS Attacks - Complete Guide

DDoS (Distributed Denial of Service) attacks are among the most common and feared types of cyberattacks. They work by overwhelming a server, website, or application with a massive number of requests, rendering the target saturated and inaccessible to legitimate users.

1 Oct, 2024

Recall - Security Risks, TotalRecall Exploit, and How to Disable It
Recall - Security Risks, TotalRecall Exploit, and How to Disable It

The Recall feature of Microsoft Copilot+ on Windows 11 has sparked significant debate. This innovation continuously captures screenshots of your PC and stores them in a database, making all your computing activities instantly searchable by Copilot. While this may seem convenient for quickly retrieving information, it raises serious privacy and security concerns.

5 Jun, 2024

Protected Users - Secure Your Credentials Against Mimikatz & Co
Protected Users - Secure Your Credentials Against Mimikatz & Co

In the world of technology, information security is a constant concern. For those of us managing enterprise networks, protecting user credentials is a top priority. Today, I’ll introduce you to a special group in Active Directory (AD) - the "Protected Users" group, and why its use is crucial in our fight against attack tools like Mimikatz.

12 Jan, 2024

How to Erase Data from Your Old Hard Drives - Eraser
How to Erase Data from Your Old Hard Drives - Eraser

Today, I’m going to share a support experience that left me perplexed. Imagine a computer that, like a ghost, decides to turn on by itself every night. Yes, you read that right. Every. Single. Night.

24 Oct, 2023

LastPass security incident 2022
LastPass security incident 2022

On December 22, 2022, password management company LastPass revealed that a group of hackers had successfully gained access to their customers' vaults.

5 Jan, 2023

Log4J Scanner in PowerShell & Shell for Windows and Linux
Log4J Scanner in PowerShell & Shell for Windows and Linux

Today, I just wanted to share a small vulnerability scanner developed by the Geneva-based company e-Xpert Solutions that helps detect Log4J vulnerabilities on your servers.

17 Dec, 2021