So you want to be a hacker?

So turn on some dark cyber techno grab yourself a jolt cola and tap into the matrix Guy Fawkes masks are optional. First things first what is a hacker? According to Wikipedia. A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network.Hackers may be motivated by a multitude of reasons, such as […]

Mapping Your Network

Cyber Security Professionals Tool Kit By using a tool called Nmap a Linux utility normally used by cyber security professionals from the tool kit of kali linux, we are able to scan the network and locate any abnormal traffic or unprotected ports. Nmap provides a number of features for probing computer networks, including host discovery […]

Hackers Of The World Unite

In light of current threats and global escalation into possible world war or risk from global totalitarian control from governments big tech and pharmaceutical companies the geopolitical landscape for information freedom and how we use it has blurred into a very grey area. Ukraine appealed for a global army of IT experts to help in […]

Let’s go phishing

So what is phishing? the fraudulent practice of sending emails pretending to be from reputable companies containing dangerous malware reveal personal information, such as passwords and credit card numbers. “an email that is likely a phishing scam” This may look like a legitimate message from say PayPal or Amazon ect asking you to secure your […]

Systems down

Red Blog Cyber Systems down Distributed Denial of Service Distributed denial of service (DDoS) attacks are a very big deal for any business infrastructure, small business e-commerce and private home network as they can stop your system dead in its tracks. A DDoS attack involves multiple connected online devices, or software collectively known as a […]

Ransomware Prevention part 2

Red Blog Cyber Ransomware Prevention part 2 Tips to Mitigate Ransomware Attacks The increasing prevalence of cybercrime is pushing organizations to rethink their security strategies. Here are some tips that can help you mitigate ransomware attacks. • Restrict administrative privileges: Use caution when handing out administrative privileges as the admin account has access to everything, including […]