Posts
Thanks to the cloud and globalization, we are connected more than we think. The mistake of the Kaseya producer seriously damaged the customers and customers of their customers.
Insights from interventions during a ransomware attack
Bitcoin in retreat, rising ransom and fading honesty. Our new experience from the world of ransomware.
How to start a career in cybersecurity?
Tips for starting a career in cybersecurity. Distilled experiences of my friends and me. Courses, websites, certifications, duration.
How Difficult is to Detect a Data Leak
Data leak? After a hacker attack, companies usually ensure the public that no personal data has been leaked. But, how do they know it?
Business E-mail Compromise: Leading Cyberattacks
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
What Does Ransom Negotiation Look Like
Demonstration of real communication between ransomware victims and hackers. Ransom negotiation, contract prices, pro-customer approach and non-stop support.
How Could Hackers Attack Vltava Basin? OSINT Research
How to use publicly available information and find a security flaw in the network? OSINT method and Vltava Basin hack case study.
How To Recover a Network After a Ransomware Attack
How to restore a corporate computer network after a ransomware attack? What to start with? I´m sharing the (hard-earned) experience so that you can restore operations as soon as possible.
Why Using VPN to Secure RDP Will Not Stop Hackers
Wondering how to increase RDP (remote desktop) security? Let me tell you how hackers most often hack RDPs and why VPN won't change anything about it.
EPYC Case Study: Servery DELL 15. AMD Gen Once Again
We have been testing the Dell PowerEdge R7515 server with a 2nd generation AMD EPYC processor. How did the AMD EPYC do vs. Intel at 4 of our customers?
How Hackers Attack Companies Through Their IT Providers
No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Hackers came up with a new trick. They learned to improve their blackmailing with ransomware
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
What hackers can do in your network
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Security insights: Laptop webcam hack
Did you tape your webcam because you're afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
HackerFest 2019 Workshop Sample
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
Are Updates Really So Important?
To update or not to update? Updates are a neverending topic. In this article, you will learn why to update and how often.
Windows 7 and Windows Server 2008 support ends. What to do?
Windows 7 and Windows Server 2008 R2 support will end on January 14, 2020. Upgrades are fully underway. What do we replace Windows with?
My view of IT certification MCSE, CCNP, ECSA, CHFI, OSCP
Are you considering where to get certified? I bring my insight into IT certification MCSE, CCNP, ECSA, CHFI, OSCP. Training, exam, practical benefits, price.
OSCP: Offensive Security Certified Professional
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Ubiquiti UniFi Case Study: Hradec Králové Stadium Connectivity
We needed to cover a stadium for 500 participants cheaply and without downtime. We chose AP Ubiquiti UniFi. UniFi controller review and conclusion.