1.7 C
Paris
Sunday, January 29, 2023

AUTHOR

Dimitris Gkoutzamanis

41 POSTS
Dimitris is an Information Technology and Cybersecurity professional with more than 20 years of experience in designing, building and maintaining efficient and secure IT infrastructures. Among others, he is a certified: CISSP, CISA, CISM, ITIL, COBIT and PRINCE2, but his wide set of knowledge and technical management capabilities go beyond these certifications. He likes acquiring new skills on penetration testing, cloud technologies, virtualization, network security, IoT and many more.

What Is The Difference Between GWAPT and OSWE Penetration Testing Certifications

GWAPT and OSWE are among the top certifications in security and are mainly built for penetration testers. Let's look at the differences between the two...

Rackspace Hosted Exchange Hit By Ransomware

Rackspace's hosted Microsoft Exchange environments were affected by a "security incident" which has knocked out email services to their customers. The Company Rackspace is one of...

Pentagon Supply Chain Fall Short Of Meeting Cybersecurity Requirements

Nation-state hackers are targeting defense contractors with sophisticated cyberattack campaigns in order to gain access to information sensitive to national security. A recent independent study...

Most Organizations Still Vulnerable To The Log4j Vulnerability

A study examining the scope and impact of the recent Log4j vulnerability has been conducted by Tenable and the results are extremely interesting. According to...

WhatsApp Data Breach: 500 million Phone Numbers On Sale

A threat actor is claiming that is selling 487 million WhatsApp user phone numbers through a hacking community forum, according to a report by...

APT Group Targeting Governments Worldwide

According to cyber security researchers from Trend Micro, state-financed Chinese hackers have launched a spear phishing campaign to launch bespoke malware stored within Google...

“OK Google”, Patch A New Zero-Day Vulnerability

Yet another Chrome "zero-day" vulnerability was patched by Google, the 8th for 2022. The tech giant released security updates to address a new zero-day vulnerability...

More Than 50 Million Passwords Stolen By Russian Cybercrime Groups

34 Russian-speaking groups distributing info-stealing malware under the stealer-as-a-service model, were identified by Group-IB. In the first seven months of 2022, the gangs collectively...

What is a Vishing Attack?

Social engineering attacks use the “human loophole” to get around security controls. Instead of hacking your accounts to steal your identity, they hack you....

Security Professionals, BEWARE of Fake PoCs

Proof-of-concept (PoC) of exploits for known vulnerabilities are widely shared in the security community. They help security analysts to learn from each other and...

Latest news