Monthly Archives: May 2021

FragAttacks: new Wi-Fi vulnerabilities found!

FragAttacks: new Wi-Fi vulnerabilities found!

A few days ago, a Belgian security researcher,  Mathy Vanhoef, has found, and named as “FragAttacks (fragmentation and aggregation attacks)”, a dozen of unknown security flows affecting Wi-Fi devices. Within radio range of a victim, a threat actor can exploit them to steal user information or attack devices. The report has found that at least three of the discovered vulnerabilities are design flaws in the Wi-Fi standard and affect most devices, as a result. Moreover, the discovery has found that are caused by widespread programming mistakes in Wi-Fi products. However, these flows are very complex to exploit giving their design and mitigation measures are already in place. Find out more on our […]

Vulnerability Assessment: an overview of a crucial cybersecurity task

Vulnerability Assessment: an overview of a crucial cybersecurity task

Vulnerability assessment is a task in delivering an effective cybersecurity strategy in both corporate and public sectors. It is vital to bring about risk awareness, and it is the very first step in analyzing an organization’s cybersecurity strategy and architecture. The best way to protect against exploitable vulnerabilities is indeed detecting them – and fix them afterward – before a threat actor notices them. In essence, a vulnerability assessment involves the automatic scanning of all items, components, and assets of an IT system, an application, or software by software.  Many confuse this security operation with penetration testing. Performing a vulnerability assessment means assuring integrity, and security, and proper management of […]

Cybersecurity analysts: what they do and why their work is vital

Cybersecurity analysts: what they do and why their work is vital

Cybersecurity analysts are the core of an organization’s security, private and public alike. They have a vital task: ensuring that their IT assets are secure and protect them from violations and attacks. Being a security analyst is everything but an easy job. In achieving their organization’s security, they have the duty to manage the IT security and risks of the entity they work for. This includes analyzing and identifying proper security solutions to make the work environment resilient to threats.   Usually reporting to a CIO (Chief Innovation Officer), their role also involves a constant liaison and engagement with other departments and business units. Cybersecurity analyst jobs require many sophisticated […]

Penetration testing: what it is and why it is important

Penetration testing: what it is and why it is important

Penetration Testing (Pen Test) refers to the activity of systematically attempting to violate a vulnerable component of a system to discover the security breaches in it through a simulated attack. The professional figure that performs such testing is a security analyst acting as a proper hacker. He or she has the task of breaking the system under assessment by following an attack strategy. This service is vital because real hackers may exploit any breaches with ease if an organization does them know them in time. Damage associated with such violations may include data theft, unauthorized access to sensitive files, service disruption, and many more. Penetration Testing should not be confused […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close