Category Archives: Technology

Netizen: November Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from October that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2021-27855:  […]
Read More »

Netizen: October Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from September that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-33891:  […]
Read More »

Netizen: September Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled eight vulnerabilities from August that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-33636 […]
Read More »

Netizen: August Vulnerability Review

Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from July that should be immediately patched or addressed if present in your environment. Detailed writeups below: CVE-2022-30222: […]
Read More »

Netizen: The Five Lures in a Phiserman’s Tacklebox.

Ever received an email telling you that you just won a brand-new car? What about a robocall saying your car’s extended warranty is about to expire? Or maybe you’ve seen a more elaborate ploy where someone included personal details such as your phone carrier and device model in an attempt to get you a free […]
Read More »

Netizen: What is Security Information and Event Monitoring (SIEM)?

Ever wonder how your organization can immediately upgrade its security infrastructure? What about all the traffic and logs generated from devices and users on the network? Security Information and Event Monitoring (SIEM) combines security information management (SIM) and security event management (SEM) into one tool that provides insights into an organization’s traffic and user behavior. […]
Read More »

Netizen Penetration Testing Guide

Cyberattacks have become an increasingly tricky issue plaguing small and medium-sized businesses in recent years. Hackers as far as halfway across the world or two states over are leveraging unpatched vulnerabilities to steal data, damage reputation, or extort a small business for as much money as possible. In 2021, The United States FBI disclosed that […]
Read More »

Zero Trust Security: A new blueprint to fight cybercrime.

This past year was one like no other. Masks became the new fashion norm, workers traded office life for remote work, and video meetings became our main vessel for communicating with one another. While the world was busy fighting one issue, another swiftly arose. Cyber crime is on the rise across the globe. According to the F.B.I. in 2020 internet and […]
Read More »

Microsoft Exchange Hack: What happened and what we learned.

On March 2nd 2021, tech giant Microsoft announced that they had uncovered major vulnerabilities in their popular mail server Microsoft Exchange. In a later statement, Microsoft announced that a Chinese-backed group known as Hafnium had begun exploiting these vulnerabilities which lead to an immediate response from Microsoft to warn all Exchange users. Shortly after this […]
Read More »

The Issue With Cloud Databases

Minimize your risk and assume the worst when considering your exposed data. Consider what the likelihood and impacts of the loss of your data would be, and implement security controls in accordance with that level of risk.