9.4 C
Paris
Sunday, November 27, 2022

AUTHOR

Dimitris Gkoutzamanis

29 POSTS
Dimitris is an Information Technology and Cybersecurity professional with more than 20 years of experience in designing, building and maintaining efficient and secure IT infrastructures. Among others, he is a certified: CISSP, CISA, CISM, ITIL, COBIT and PRINCE2, but his wide set of knowledge and technical management capabilities go beyond these certifications. He likes acquiring new skills on penetration testing, cloud technologies, virtualization, network security, IoT and many more.

WhatsApp Data Breach: 500 million Phone Numbers On Sale

A threat actor is claiming that is selling 487 million WhatsApp user phone numbers through a hacking community forum, according to a report by...

APT Group Targeting Governments Worldwide

According to cyber security researchers from Trend Micro, state-financed Chinese hackers have launched a spear phishing campaign to launch bespoke malware stored within Google...

“OK Google”, Patch A New Zero-Day Vulnerability

Yet another Chrome "zero-day" vulnerability was patched by Google, the 8th for 2022. The tech giant released security updates to address a new zero-day vulnerability...

More Than 50 Million Passwords Stolen By Russian Cybercrime Groups

34 Russian-speaking groups distributing info-stealing malware under the stealer-as-a-service model, were identified by Group-IB. In the first seven months of 2022, the gangs collectively...

What is a Vishing Attack?

Social engineering attacks use the “human loophole” to get around security controls. Instead of hacking your accounts to steal your identity, they hack you....

Security Professionals, BEWARE of Fake PoCs

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and...

Why Is Database Encryption Important?

With data breaches continuing to occur at an alarming rate, protecting sensitive data is critical for all businesses. As organizations store more data than...

Best Information Security Books

People refrain from reading either it is for pleasure or for professional and academic progression. If you are an information/cyber security professional who wants to...

How to get Cybersecurity experience as a beginner?

The demand for skilled workers is constantly growing and if you are a beginner in infosec/cybersecurity, you need to find ways to acquire relevant...

Best Cybersecurity Certifications for Penetration Testing

Certifications in cybersecurity are essential both for job hunting, but also for you as a professional to advance your knowledge in the field. This is...

Latest news