Skip to content

Good afternoon

From Chaos to Order – a NewPush Special Event

Over the years NewPush has organized a series of online conferences which featured some of the leading minds of our industry. The latest such event took place on 31 March and was centered around the idea of disruptive innovation in cybersecurity.

Building a SOC and choosing an MSSP

Organizations of different sizes have different ways of dealing with cyber security challenges. Depending on external factors, the environment they operate in, or internal factors such as budgetary constraints, they might choose to manage their security with an in-house team, or outsource it to a dedicated firm.

Peruvian Uni Attack Thwarted

On 13 May 2021, the Laureate security team became aware of an ongoing ransomware attack directed against two UPC servers. Though the attacker managed to escape identification, it is clear that they were both financially motivated and unable to achieve their goal.

Review: The Life and Times of Cybersecurity Professionals 2021

The fifth annual report by ESG and the ISSA provides fascinating and alarming insights into the lives of cybersecurity professionals.

Moves towards Crypto Legislation

This debate over what the future of cryptocurrencies should look like is just heating up, as central banks around the world are developing their own currencies, and legislation is being passed to begin to define the crypto sector.

An ever-changing landscape

The cybercrime trends of last year continue in 2021 as the first half of the year has seen records of the previous year broken with even more vicious attacks.

Kaseya 2021 - Thousands Compromised in Latest Ransomware Attack

A ransomware attack whose sophistication and scale go beyond anything we've ever seen has recently hit Kaseya, an IT Management Software provider. We look into what has been uncovered so far, and what experts think will happen next.

Passwords - Nothing stays secret forever

Secure and protected passwords are the bedrock of every user’s internet security, but coming up with new passwords for each account, as well as securely storing all your data presents a daily challenge.

Reactions to The SolarWinds Orion Hack

The SolarWinds attack was, to date, the largest scale cyber attack that affected hundreds of organisations. Because it went undetected for so long, its reach and effects are still the subject of investigation, and there will be ongoing debate as to the ways to prevent such attacks in the future.

The Little Card That Could

Scammers get very creative in gaining access to user data, and some US mobile providers' security systems allow for a little-thought-of way in. What is a SIM Swap Scam, and how can it be avoided?

Building a human firewall —an essential weapon in your arsenal

Technical aspects of cybersecurity aside, improving employee training is the best investment a company can make. Let's look at social engineering tactics, Smishing and Phishing, and the training programme Kevin Mitnick developed.

Four Vulnerabilities of Higher Education in IT Security

Cybercrime shot up in 2020, and institutes of higher education are near the top of the target list. Hackers looking for ways in have an easy job with faculty and students largely unaware of the dangers and unfamiliar with phishing tactics.

Cyber Threats to the Healthcare Sector in the New Normal

The major trends that have affected the healthcare industry in the coronavirus period as a way of preparing the organizations involved.

Best Security Practices for Enterprises in the Post-COVID World

Best Security Practices for Enterprises in the Post-COVID World

How to Safeguard Data When the Majority of Your Workforce is Remote?

A summary of measures taken to protect data when employees are working remotely.

Tinkering with Raspberry Pi 8GB

This summer of 2020, the long awaited 8GB version of the Raspberry PI 4 came out. Along with that hardware update came other goodies: USB boot: USB Gadget Image Builder (to have a fully functioning local network with you iPad Pro over USB C: 

Business Identity Theft: How You Can Protect Your Business

Did you know that in the U.S someone falls victim to identity theft once every two seconds? In 2017 alone, 60 million Americans were affected by identity theft, with the annual cost of this kind of fraud in the U.S being a staggering billion. Of course, it is not just individuals who are at […]

Set up automatic updates for Brew on Mac OS X

Automated updates for the core OS has been available for several years now on Macs, and Apple has added the ability to update automatically apps you have added from the AppStore as well. However, if you have installed open source apps with Brew, chances are that you may forget to update them regularly. This is […]

Tinkering with CryptoMining

If you are in SecOps, you probably have seen the threat of CryptoMiners running on compromised hosts. This article may not be for you, but if you would like to dive deeper inside of the working of crypto-mining you will find a few resources here to get you started. For the example I use the […]

Your own background in MS Teams

This is an undocumented feature as of this writing, but on Windows you can upload a background image to MS Teams here: %AppData%\Microsoft\Teams\Backgrounds\Uploads   Stay tuned for Mac OS X