Category Archives: Education

Netizen: August Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from July that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-30222: […]
Read More »

Netizen: The Five Lures in a Phiserman’s Tacklebox.

Ever received an email telling you that you just won a brand-new car? What about a robocall saying your car’s extended warranty is about to expire? Or maybe you’ve seen a more elaborate ploy where someone included personal details such as your phone carrier and device model in an attempt to get you a free […]
Read More »

Netizen: What is Security Information and Event Monitoring (SIEM)?

Ever wonder how your organization can immediately upgrade its security infrastructure? What about all the traffic and logs generated from devices and users on the network? Security Information and Event Monitoring (SIEM) combines security information management (SIM) and security event management (SEM) into one tool that provides insights into an organization’s traffic and user behavior. […]
Read More »

Netizen Penetration Testing Guide

Cyberattacks have become an increasingly tricky issue plaguing small and medium-sized businesses in recent years. Hackers as far as halfway across the world or two states over are leveraging unpatched vulnerabilities to steal data, damage reputation, or extort a small business for as much money as possible. In 2021, The United States FBI disclosed that […]
Read More »

CyberSecure Solutions Security Bulletin (September 4, 2019)

Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and […]
Read More »

CyberSecure Solutions Security Bulletin (August 21, 2019)

Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example […]
Read More »

CyberSecure Solutions Security Bulletin (August 7, 2019)

Overview Phish Tale of the Week Cyber Attacks on the Rise US Utilities Have Become Targets How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week For this week’s Phish Tale of the Week, we’re taking a look at the phishing email that was sent to our HQ office that claims to be a promotional […]
Read More »

CyberSecure Solutions Security Bulletin (July 24, 2019)

Overview Phish Tale of the Week Sprint Breach Exposes Customer Data Critical Flaw Found In VLC Media Player How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week As is typical for most businesses, our HQ Office inbox receives the occasional phishing email attempting to trick an employee into sending the perpetrator some sort of […]
Read More »

Netizen Cybersecurity Bulletin (July 10, 2019)

Overview Phish Tale of the Week Microsoft’s BlueKeep Proves Vulnerable Critical Warning Issued for Samsung Cellphone Update App How Can Netizen Help? Phish Tale of the Week Phishing attempts are often carried out with urgent messages that are meant to provoke the victim to act without rationally thinking about the contents of the email. In […]
Read More »

Netizen Cybersecurity Bulletin (June 26, 2019)

Overview Phish Tale of the Week Vulnerability in TP-Link’s Wi-Fi Extenders Could Allow Remote Control to Attackers Latest Phishing Scam Impersonates Apple Support How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing email targeting […]
Read More »