Author: CyberVyber
-
Wow!!Free Open Wi-Fi Connection…Oops! Could there be an Evil Twin?
The Free Wi-Fi Scenario When one visits a Public place viz., Coffee shop or a Restaurant or a Railway station, most of the internet (mobile, laptops etc.) users look for a free/complimentary Wifi connection! Don’t we ?? For convenience purpose, the coffee shop owners etc., either keep their Wi-Fi connections open (no password) or…
-
How to Pass CEH v10 (312-50)?
Passing CEH v10 has never been so easy, just follow these steps in my new blog post… CEH v10 exam 312-50 still follows the same MCQ (Multiple Choice Questionnaire) format. There are two new chapters added to this edition of exam viz., IoT Hacking and Vulnerability assessment. Understanding the Exam Objective: The exam objective is…
-
An Overview of Identity And Access Management (IAM) and it’s Basic hygiene
What’s an IAM? In Security solutions, there is no silver bullet to defend critical assets i.e., there needs to be a layered defence to keep the adversaries at bay. One of the defence mechanisms that an organisation needs to include in its front door arsenal is the, Identity & Access Management (IAM) solution. IAM is…
-
Cyber Threat intelligence (CTI) Data models overview
CTI has been a topic of discussion in the past few years, we heard about various threat actors influencing national elections, taking down power grids, stealing Intellectual property rights, credit card data theft etc. So there has been an urge to share threat intelligence and follow adversaries in real time to counter them. When it…