Cyber Security
iOS VPN Vulnerabilities and Data Leaks: An Ongoing Issue
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
Despite advancements in iOS versions, VPN vulnerabilities persist, affecting user privacy and security. Even in the latest version, iOS 18.1.
Cyber Security
The journey of new NIST password guidelines in 2024 reflects a fundamental shift in cybersecurity thinking, moving from complexity-focused approaches to more user-centric, practical security measures.
Programming
This Go project creates a Kubernetes Security Monitor that periodically checks for common security issues in a cluster. It includes checks for privileged containers, missing network policies, and outdated Kubernetes versions.
Cyber Security
Be your own Certificate Authority (CA) and issue your own signed certificates to use for encrypted communications
Cyber Security
Trying to enhance local network access, I imported the Cloudflare Origin Server certificate. Despite adding it to Windows' Trusted Root Certification Authorities, Chrome flagged a certificate error, labeling the connection insecure. Firefox, however, indicated a secure connection without warnings.
Cyber Security
Inconsistencies in incident monitoring within Microsoft Sentinel: TimeGenerated (last update time) vs CreatedTime (incident occurrence time). Overview tab shows 225 incidents in 24 hours, but counts vary based on timestamp used. Author suggests using CreatedTime for accurate representation.
Cyber Security
Many out-of-the-box ISP routers come with basic, pre-configured passwords vulnerable to brute-force attacks. Attackers can crack these passwords in up to 30 minutes using dedicated GPUs and tools. Users should be aware of these vulnerabilities and take measures to secure their home networks.