Business E-mail Compromise: Leading Cyberattacks
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
In the Head of the Network Administrator: Thoughts, Ideas, Insights
Business E-mail Compromise cyber attacks type Counterfeiting emails, identity theft aimed at making money. How do the BEC attacks work?
Demonstration of real communication between ransomware victims and hackers. Ransom negotiation, contract prices, pro-customer approach and non-stop support.
How to use publicly available information and find a security flaw in the network? OSINT method and Vltava Basin hack case study.
How to restore a corporate computer network after a ransomware attack? What to start with? I´m sharing the (hard-earned) experience so that you can restore operations as soon as possible.
Wondering how to increase RDP (remote desktop) security? Let me tell you how hackers most often hack RDPs and why VPN won’t change anything about it.
No matter how much you invest in IT security if your provider messes around. Beware of hacker attacks through providers.
Ransomware actors have a new trick. None of backup solutions can mitigate it. They are threatening to release all the stolen information.
Companies end up without data or backups after a ransomware attack because they underestimate the skills of hackers. Learn what a hacker can do within your network and how to improve security.
Did you tape your webcam because you’re afraid of hackers? The video shows how easy it is to hack a laptop webcam. Do you know how to defend getting hacked?
We have made one Linux virtual server available for you to hack from the comfort of your home just after the HackerFest 2019. Go on!
To update or not to update? Updates are a neverending topic. In this article, you will learn why to update and how often.
Windows 7 and Windows Server 2008 R2 support will end on January 14, 2020. Upgrades are fully underway. What do we replace Windows with?
Are you considering where to get certified? I bring my insight into IT certification MCSE, CCNP, ECSA, CHFI, OSCP. Training, exam, practical benefits, price.
Over 60 servers hacked, 5 months of life and 1 exam. My path to OSCP certification: Offensive Security Certified Professional.
Compromised computer or stolen data? Watch a video on how to get hacked by a RDP server. And then read how to defend against this attack.
TeamViewer and its imperfections. What don’t we like after 4 years of use? And how do we set TeamViewer up to be as safe as possible?
TeamViewer is our remote user support tool. We can handle over 270 connections a week. What do we like about TeamViewer? And why did we buy it?
The monitoring system, thanks to which we have our networks in order and a constant overview of their health. Practical video directly from the production environment.
How easy is it to hack a computer? Video recording from my Barcamp lecture in Hradec Králové. I’ll tell you about the danger that comes through USB.
Ubiquiti UniFi and Fortinet Security Fabric help us manage larger networks, with more security and less effort. Little revolution in network management.