Vulnerability in Cisco Small Business Switches

Nothing new with these Cisco Small Business Switches. A researcher, Jasper Adriaanse has identified several vulnerabilities, including ones that have been rated high severity, in Cisco’s Small Business 220 series smart switches.

These vulnerabilities were discovered to impact switches that run firmware versions earlier than 1.2.0.6 and have the web-based management interface enabled which the interface is enabled by default. In an advisory released a few days ago, Cisco said Jasper Adriaanse found a few types of security holes in the small business switches.

One of them, tracked as CVE-2021-1542 and rated high severity, can be exploited by a remote, unauthenticated attacker to hijack a user’s session and gain access to the switch’s web interface. Depending on the privileges of the targeted user, the attacker could gain admin-level access to the management interface.

Another high-severity issue is CVE-2021-1541, which allows a remote attacker with admin permissions on the … Read the rest

UniFi Tutorials

How to direct Unifi VLAN traffic to OpenDNS

In this tutorial you will be shown how to direct UniFi VLAN traffic to OpenDNS. Many companies love using OpenDNS due to it ease of use but sometimes it can be tricky to deploy on UniFi since the GUI keeps changing. This tutorial guides you through Unifi Controller Version 6.1.71.

OpenDNS is a Internet security company based in San Francisco that provides easy-to-implement Internet navigation and Web security solutions for families, schools, governmental organizations and businesses of all sizes. The services provided by OpenDNS increase the speed of navigating websites and prevent unintended access to phishing and malware sites as well as to any Web content that you configure to be restricted. 

Lets Get Started

In this tutorial I will be using a UniFi UDM Pro on Controller Version 6.1.71. Please update your controller as needed as some times may vary if your not up to date. I will be … Read the rest


Ransomware Risk Management

The National institute of Standards and Technology (NIST) has released a new document called: cybersecurity framework profile for ransomware risk management. The document contains detailed steps that you can take to reduce the risk of infection and it has was to prevent ransomware attacks. 

They outline these basics

NIST has provided the basic and best approach to preventing, mitigating and protecting critical data against  ransomware events and they recommend the following: 

  • Use Antivirus Software to scan your system, emails and flash drives.
  • Keep Systems up to date and all software fully patched.
  • Use a services or products that blocks access to ransomware sites.
  • Put a policy in place that only allows authorized apps to be used in computers.
  • Restrict personal devices to internal network access resources.
  • Do not provide users with local administrative privileges.
  • Block use of personal apps on work computer for example: email, chat, social media.
  • Provide
Read the rest

Install Windows 11 Within VirtualBox

In this tutorial you will be shown how to install Windows 11 within VirtualBox. VirtualBox is great VM software to test releases of different types of OS’s.

 

Lets get started

  1. Lets download Virtual Box 
  2. Once downloaded go through the wizard and leave default settings.
  3. If you need Windows 11 you can follow this Windows 11 Download tutorial.
  4. Open Virtual Box.
  5. Click on the New icon.
  6. Name your Virtual Machine
  7. Find and select version and select Windows 10. Click Next
  8. Memory Size 2GB will be fine. Click Next
  9. Hard Disk, Select Create a Virtual hard disk now. Click Next
  10. Hard Disk File type can be left with VDI selected. Click Next
  11. Storage on physical hard disk, select Dynamically allocated. Click Next
  12. File location and size can be left as default. Click Create
  13. Start the virtual machine
  14. VM should boot into the ISO, go through the process of installing windows.

If you

Read the rest

How to Download Windows 11

In this tutorial you will be shown how to download and install Windows 11 and use Rufus bootable USB. This is the latest release of Microsoft Windows 11 is visually great in my option however it all comes down to how you feel about it. 

This tutorial I will show you how to download Windows 11 iso. Make sure you have proper backups of your system before making any changes. You choose to move forward at your own digression and I will not be liable for any data loss.
Keep in mind that this stolen software release was not supposed to be leaked to the public. This ISO was found from random link sources and may have been tampered with. 

 

 

Windows 11: Release Date

We could expect Microsoft to announce the release date of Windows 11 at its event next week. The event is scheduled for June 24 at 11:00 … Read the rest


Phishing Attacks Growing At Rapid Pace

In a recent research report it was revealed that there has been a growing increase in phishing attacks since the pandemic. According to the research report by the FBI, 11 times more phishing attacks were reported in 2020 as compared to 2016 and 91% of security breaches were initiated by sending phishing attacks on victims.
 

What’s going on?

As mentioned in this report, phishing attacks were the most frequent type of attack method used in malware-based attacks in 2020, nearly doubling its growth from the previous year. 
  • The frequency of phishing attacks is different for each industry and is based on the targeted firm’s size. Healthcare and manufacturing sectors are the most targeted by phishing scams.
  • Social media are also lucrative targets, with social messaging apps being the main target. Accounts with single sign-on accounted for 40% of all phishing attacks.
  • There are many different types of phishing attacks
Read the rest

SSL VPN Attacks Up Nearly 2000%

A recent report published by Nuspire outlined what activity cyber criminals have been up to. SSL VPN attacks have gone up nearly 2000%. 

 

Increase in VPN attacks

In Q1 2021, there was a 1,916% increase in attacks against Fortinet’s SSL-VPN and a 1,527% increase in Pulse Connect Secure VPN. These vulnerabilities allow a threat actor to gain access to a network. Once they are in, they can exfiltrate information and deploy ransomware.

“2020 was the era of remote work and as the workforce adjusted, information technology professionals scrambled to support this level of remote activity by enabling a wide variety of remote connectivity methods,” said J.R. Cunningham, CSO at Nuspire. “This added multiple new attack vectors that enabled threat actors to prey on organizations, which is what we started to see in Q1 and are continuing to see today.”

Because of the significant increase in VPN and RDP … Read the rest

Docker Tutorials

How To Execute Docker without using sudo privilege on Ubuntu 20.04

In this tutorial you will be shown how to configure Ubuntu 20.04 to execute Docker without using sudo. By default, you have to run docker commands with sudo privilege or by a user in the docker group. This tutorial will show you how to bypass that.

To test your privileges to confirm you cannot run Docker without sudo type in docker run hello-word. You should get the following message and if should move forward with the tutorial.

$ docker run hello-world 
Got permission denied while trying to connect to the Docker 
daemon socket at unix:///var/run/docker.
sock: Get http://%2Fvar%2Frun%2Fdocker.sock/v1.27/containers/json: 
dial unix /var/run/docker.sock: connect: permission denied

 

Lets Get Started

  1. SSH into your Ubuntu 20.04 server.
  2. Create new group. This command will likely fail as group maybe already exist, but let’s run it anyways.
sudo groupadd docker

3. Now we will add the current logged in user to the docker group

sudo 
Read the rest
Docker Tutorials

Docker Command Guide: A Complete List of Essential Commands

DockerIn this tutorial you will be shown how to use Docker commands and if you need help Executing docker without using sudo privilege click here.

In this section below I will explain how to use docker commands. So, before going into these details, let’s take look at the syntax of ‘docker’ commands:

$ docker [options] [sub-commands] [arguments]

Now if you want to list all available sub-commands of docker, run:

$ docker

There are many sub-commands and arguments that can follow after $docker. Below are some of them in the following sections of this tutorial.


Management Commands:

  attach      ## Attach local standard input, output, and error streams to a running container
  build       ## Build an image from a Dockerfile
  commit      ## Create a new image from a container's changes
  cp          ## Copy files/folders between a container and the local filesystem
  create      ## Create a new container
  diff        ## Inspect changes 
Read the rest

54% of all employees reuse passwords on multiple accounts

Yubico released the results of a study into current attitudes and adaptability to at-home corporate cybersecurity, employee training, and support in the current global hybrid working era. The report surveyed 3,006 employees, business owners, and C-suite executives at large organizations (250+ employees), who have worked from home and use work issued devices in the UK, France and Germany.

Data shows that since the start of the pandemic employees have been engaging in poor cybersecurity practices on work-issued devices, with business owners and C-level executives proving to be the worst culprits. At the same time, enterprises are falling short on cybersecurity best practices that need to be implemented for out-of-office environments.

Less than a quarter of respondents admit to even implementing 2FA since the start of the pandemic and even then, many are using less secure and less user-friendly forms of 2FA like mobile authentication apps and SMS one-time passcodes.

Read the rest

Stay Informed

Receive instant notifications when new content is released.