Author Archives: asaptristan

Netizen: November Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from October that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2021-27855:  […]
Read More »

Netizen: October Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from September that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-33891:  […]
Read More »

Netizen Cybersecurity Bulletin (September 30th, 2022)

Overview: Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors and come in many different forms. In this instance, we see not a phishing scam, but a SMSishing scam targeting two different groups. One text appears to be a notification that we have new funds […]
Read More »

Netizen: September Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled eight vulnerabilities from August that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-33636 […]
Read More »

Netizen Cybersecurity Bulletin (August 26th, 2022)

Overview: Phish Tale of the Week Whistleblower Comes Forward Alleging Major Cybersecurity Issues at Twitter U.S FBI and CISA Issue Alert for Zeppelin Ransomware How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam […]
Read More »

Netizen: August Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from July that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-30222: […]
Read More »

Netizen Cybersecurity Bulletin (July 29th, 2022)

Overview: Phish Tale of the Week T-Mobile Agrees to $500 million in 2021 Data Breach Settlement Idaho Universities helping fill Cyber Workforce Gap How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting […]
Read More »

Netizen: The Five Lures in a Phiserman’s Tacklebox.

Ever received an email telling you that you just won a brand-new car? What about a robocall saying your car’s extended warranty is about to expire? Or maybe you’ve seen a more elaborate ploy where someone included personal details such as your phone carrier and device model in an attempt to get you a free […]
Read More »

Netizen Cybersecurity Bulletin (June 28th, 2022)

Overview Phish Tale of the Week Lithuania Suffers a Series of DDOS Attacks Following The Ban of Kaliningrad Imports Carnival Cruise Lines Hit With $5,000,000 Fine for Cybersecurity Incidents How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, […]
Read More »

Netizen: What is Security Information and Event Monitoring (SIEM)?

Ever wonder how your organization can immediately upgrade its security infrastructure? What about all the traffic and logs generated from devices and users on the network? Security Information and Event Monitoring (SIEM) combines security information management (SIM) and security event management (SEM) into one tool that provides insights into an organization’s traffic and user behavior. […]
Read More »