How To Create An Azure Virtual Machine – Lab1
In this tutorial you will learn how to create an Azure Virtual machine using Window Server 2022 Datacenter image and learn how to connect to the virtual machine using RDP.
Task Details
-
Sign to Azure Portal.
-
Create an Azure Virtual Machine.
-
Understand deployment details.
-
RDP into the virtual machine
-
Test the created virtual machine.
Task 1: Login to Azure Portal
- Open a browser tab and go to the Azure portal using URL https://portal.azure.com.
- Sign in with your username and password on azure portal.
Task 2: Create A Virtual Machine
1. There are a few options you can locate the Virtual machines afterwards click on the Virtual machine’s menu in the Left panel. You can also use the search bar at the top to find the Virtual Machines page or you can use the Virtual machines icon right Infront of you.
2. If you see any error in the page, wait … Read the rest
Vulnerability in Spring Java framework called Spring4Shell
Spring4Shell CVE-2022-22965, a critical vulnerability has been found in Spring, an open source programming framework for the Java platform. It could allow hackers to take control of your system. Details about the vulnerability were leaked to the public before the patch was released. Fortunately, only a small number of users have been affected.
The VMware developers who created the Spring Framework released patches to fix vulnerable applications, so we recommend that all companies using Spring Framework versions 5.3 and 5.2 immediately upgrade to versions 5.3.18 or 5.2.20.
Why is Spring4Shell vulnerability dangerous?
The vulnerability is serious. An attacker can remotely execute malicious code on your site. The vulnerability is in the RCE class, which means that an attacker can exploit it to do whatever he wants, such as steal credit card numbers or install malware. The vulnerability specifically affects Spring MVC and Spring WebFlux applications running under Java Development Kit … Read the rest
How To Configure VLAN On UniFi Controller 7.0
In this tutorial you will learn how to configure a VLAN with DHCP on UniFI Controller 7.0.
VLAN Stands for “Virtual Local Area Network,” or “Virtual LAN.” A VLAN is a custom network created from one or more existing LANs. It enables groups of devices from multiple networks (both wired and wireless) to be combined into a single logical network. The result is a virtual LAN that can be administered like a physical local area network.
Let’s get started.
Make sure you are on latest Unifi Controller Version. This tutorial was created for version 7.0.25. I will be using a Unifi UDM Pro for this configuration.
Step 1: Log into your Unifi Controller.
Step 2: Click Settings
Step 3: Click Networks
Step 4: Once the page loads click on Create New Network.
Step 5: Name your Network for the use case it is intended for. For me, I have to create this VLAN for my … Read the rest
Cyber Security Steps To Protect Your Company
Ransomware attacks rose again. The number of ransomware families rose from 143 to 157 in just one year. This means that the frequency and severity of attacks is still increasing. Ransomware attacks are up over last quarter, over the previous year, and up over the last three years.
The cybersecurity report you just read found that these cybercriminal groups are continuing to target unpatched vulnerabilities and weaponize zero-day vulnerabilities in record time to instigate crippling attacks. At the same time, they are broadening their spheres of attack and finding newer ways to compromise organizational networks and fearlessly trigger high-impact assaults.
Ransomware attacks can be devastating. According to Coveware, an attack costs an average of $220,298 and 23 days of downtime. Given the scramble to shift to the digital landscape combined with unprecedented shortages of skilled IT labor, a cyber-attack could cripple even the strongest businesses.
Get your head in
… Read the restOpenSSL Infinite Loop Vulnerability
The US National Security Agency (NSA) officials have recently discovered a vulnerability in the OpenSSL cryptographic library. This vulnerability can be used to conduct denial-of-service attacks and can be easily weaponized by its potential attackers.
OpenSSL is a popular cryptography library used to encrypt data and verify digital signatures. The bug affects the BN_mod_sqrt() function, which is used to calculate the modular square root and parses certificates that use elliptic curve public key encryption. This vulnerability has been given the identifier CVE-2022-0778.
If an attacker submits a certificate with broken curve parameters, the program will go into an infinite loop and crash. This will cause denial of service.
… Read the rest“Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack,” OpenSSL said in a March 15 security advisory. “The infinite loop
How To Configure Unifi Controller Guest Hotspot With Stripe Payment
In this tutorial you will learn how to configure your Unifi Controller 7.0.22 Guest Hotspot with Stripe Payment. This will come handy if you’re looking to monetize your Public WiFi access.
Before we start make sure you are on Unifi Controller 7.0.22 or later and proceed to adopt all your Unifi devices into your controller. Make sure all firmware is updated as well.
The Tutorial Run Down
- Configure a Guest Network.
- Configure Bandwidth Profile.
- Configure a SSID for a group of access points.
- Configure Guest Hotspot Profile with Stripe Payment.
- Simple way to view Stripe payments.
Let’s start by configuring the Guest Network.
1. Log into your Unifi Controller 7.0.22
2. Once you’re on the dashboard click Settings.
3. Now locate and click on Networks.
4. Now that you’re on the Networks Section locate and click on Create New Network.
5. For our New Network let’s do … Read the rest
How To Configure Unifi Controller Guest Hotspot With Vouchers
In this tutorial you will learn how to configure your Unifi Controller 7.0.22 Guest Hotspot with Vouchers. This will come handy if you’re a hotel or some type of business looking to control guest access to your Wi-Fi using a finite time-based voucher.
Before we start make sure you are on Unifi Controller 7.0.22 or later and proceed to adopt all your Unifi devices into your controller. Make sure all firmware is updated as well.
The Tutorial Run Down
- Configure a Guest Network.
- Configure Bandwidth Profile.
- Configure a SSID for a group of access points.
- Configure Guest Hotspot Profile with vouchers.
- Simple way to manage vouchers.
Let’s start by configuring the Guest Network.
1. Log into your Unifi Controller 7.0.22
2. Once you’re on the dashboard click Settings.
3. Now locate and click on Networks.
4. Now that you’re on the Networks Section locate and click on Create … Read the rest
APC Smart UPS Zero Day Vulnerability
Three critical Zero Day vulnerabilities have been uncovered in popular uninterruptible power supply APC-SMART UPS devices. They could be exploited and used to bring down infrastructure and even cause physical harm. A malicious actor could exploit these flaws and cause severe service disruptions, data loss, and even lead to a potential injury.
Researchers from Armis Labs recently found a flaw in APC Smart-UPS, which could be catastrophic for millions of businesses around the world. A subsidiary of Schneider Electric, APC is one of the leading suppliers of UPS devices worldwide. These devices are essential for companies that require high availability, such as hospitals. The flaw has been dubbed TLStorm and is a result of an unprotected remote management interface.
Cybersecurity researchers are warning businesses to prepare for digital disasters. There’s a high risk of cyber and physical damage if the vulnerabilities are exploited, according to a report published online on … Read the rest
Top 5 Cybersecurity Predictions For 2022
This is tough to predict however I think we’ll see a lot of interesting developments for 2022. And they’ll be related to all the challenges and problems we’ve seen in the past. Cybersecurity is a long, hard-fought war between cybercriminals and businesses. Who will make the most progress in this domain? I think it’ll be businesses that are able to adapt quickly.
People all over the world are looking forward to the new developments, achievements, and challenges 2022 will present. The increasing number of cyber-attacks worldwide makes people fear that the cybersecurity landscape in 2022 will be even more troubling.
There is no doubt that cybercrime will continue to grow, and businesses must adapt in order to keep their information safe. To reach this goal, it is important to understand what exactly you are up against. Here are the top five cybersecurity predictions for 2022.
Prediction #1: The cyber-attack that
… Read the restHow To Configure Site to Site VPN On Unifi Controller 7.0.22
In this tutorial you will learn how to configure Unifi UDM PRO Site to Site VPN on Unifi Controller 7.0.22.
A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network. Many organizations use site-to-site VPNs to leverage an internet connection for private traffic as an alternative to using private MPLS circuits.
Site-to-site VPNs are frequently used by companies with multiple offices in different geographic locations that need to access and use the corporate network on an ongoing basis. With a site-to-site VPN, a company can securely connect its corporate network with its remote offices to communicate and share resources with them as a single network.
Let’s get started.
Make sure you are on Unifi Controller Version 7.0.22. I will be using a Unifi UDM Pro for this configuration.
Step 1: Log into your Main Office Unifi … Read the rest