Metasploit: Best Penetration Testing Software

diesec-metasploit

Metasploit is an open-source pen testing tool designed to help companies and individuals discover system vulnerabilities. It was created by H.D. Moore in 2003 and was acquired by Rapid7, a provider of cybersecurity solutions and an IT insight platform. It is one of the most advanced cybersecurity solutions available, comprised of a host of unique…

Read More

Microsoft Office 365 feature can help Cloud ransomware attacks

DIESEC - Blog - Microsoft Office 365 feature can help Cloud ransomware attacks

Ransomware hacking attacks typically target data stored on system endpoints and online drives. These files are traditionally not as thoroughly protected by local antivirus systems, and even though Microsoft’s web defense mechanisms are among the best on the market, a “dangerous piece of functionality” was discovered in Microsoft Office 365 recently. Proofpoint, one of the…

Read More

Microsoft report on Russian cyber attacks on Ukraine

DIESEC - Blog - Microsoft report on Russian cyber attacks on Ukraine

Microsoft detected destructive cyberattacks against Ukraine and released a special report on April 27, 2022, titled “Special Report: Ukraine.”  The DHS (Department of Homeland Security) warns Ukraine that Russian cyberattack frequency may increase and potentially become even more aggressive. Cyber threat actors have already caused significant damage and may exploit any number of vulnerabilities that…

Read More

What is cyber security?

cyber-security

Cyber security, what is it, and how does it work? The combination of techniques, technologies, and human resources used to protect computer systems is called cyber security. The object of protection is both the computer system and all data it may contain. Cyber security strives to address both current matters and potential cyber-attacks that may…

Read More