To Pay or Not to Pay Ransom – Hawaiʻi Community College
In a recent job interview, I was asked the question if one should pay a ransom if all technical possibilities have been explored, and one has hit a dead end…
In a recent job interview, I was asked the question if one should pay a ransom if all technical possibilities have been explored, and one has hit a dead end…
Today concludes the second day of the Cybersecurity Sensitization and Training hosted by the Ministry of Home Affairs and New Growth Industries in partnership with CARICOM IMPACS. There were participants…
A larger-than-life prominent figure in the early 90’s hacker community dies at age 59, Kevin Mitnick. According to BBC News, Kevin died on July 16th, 2023 after battling a long-time…
In recent years, there’s been some growth in Cybersecurity interest in Belize. Today, the Ministry of Home Affairs and New Growth Industries in partnership with CARICOM IMPACS is hosting a…
It’s normal to hear companies, businesses, and individuals being hacked in cyberspace for many reasons. However, there are those extreme rare cases whereby hackers are on the other side of…
A super small size file of only 313 Kilobytes made public exposes 5,600 names that include personnel from NSA and German Intelligent services. This all took place on the VirusTotal platform
It’s not often that a company in Belize discloses information about cyber-attacks, but BEL has always been at the forefront of transparency as a cooperate citizen. In today’s release, BEL…
Of all five vulnerabilities, the most severe is CVE-2023-36460 which has been named TootRoot. In essence, this vulnerability can be used to plant backdoors on servers that deliver the content to end users.
In my previous post on Cybersecurity on Small and Medium Sized Businesses it was established that SMBs are not immune to cyber-attacks. Cyber-attacks are on the rise, and a vast…
Cisco warns end users that their Cisco Nexus 9000 Series Fabric Switches in ACI mode are vulnerable and can lead to “unauthenticated, remote attacker to read or modify intersite encrypted traffic.”