The State of Server-Side Request Forgery Risks in 2022

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

server-side request forgery

Perhaps one of the best Black Hat talks in recent years was renowned web security researcher Orange Tsai’s presentation about bypassing Server-Side Request Forgery (SSRF) defenses. Together with his team, Tsai proposed a “very general attack approach” to discover numerous zero-days in built-in libraries of widely-used programming languages including Java, PHP, Python, Perl, JavaScript and … Read more

The Importance of Cybersecurity and DDoS Protection in Finance

Author(s):

Marc Wilczek, COO, Link11

DDoS Protection & Financial Security

The financial services sector is one of the biggest industries at risk, particularly after the COVID-19 pandemic and the boosted digitalization of business and personal finances. Banking is no longer a brick-and-mortar business; banking is digital, it’s mobile – 24/7, around the globe, which provides cybercriminals with more attack surfaces. Lately, we have seen cybercriminals … Read more

Can VPNs Stop DDoS Attacks?

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Can VPNs Stop DDoS Attacks?

The whole point of a website is to be up and running 24/7; however, cybercriminals can attack at any moment, forcing you offline. They can use Distributed Denial of Service (DDoS) attacks to interrupt your business and impact your revenue. In a DDoS attack, attackers send thousands of unwanted requests to the servers, preventing legitimate … Read more

How to Reduce Human Error in Cybersecurity with Red Teaming

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

Red Teaming - Cognitive Bias

Human error in cybersecurity evokes images of untrained employees logging into systems with weak passwords used for multiple accounts or clicking on phishing emails. However, mistakes can come from the most experienced members of your IT and security team – professionals who know more about cybersecurity than anyone else in your company. As they progress … Read more

How to Tell if Your Wireless Router Has Been Hacked

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

How to Tell if Your Wireless Router Has Been Hacked

Routers are hardware devices used by ISPs (Internet Service Providers) to connect their customers to their xDSL or cable internet network. Wi-Fi routers or wireless routers combine wireless access points, networking functions, and a router. In essence, routers connect local networks to the internet or other local networks; thus, wireless access points connect devices to … Read more

How to Write a Cybersecurity Policy For Your Company

Author(s):

Chloe Bennet, Cybersecurity Manager, Fast Assignment Help, Write My Dissertation Cheap, Help With Homework

Group of employees being briefed on the Cybersecurity Policy

Cybersecurity is one of those areas that executives frequently overlook. However, it is hugely important. The problem usually lies with the speed at which technology develops and the ease with which fields within technology evolve. People who are looking to exploit new technology stay up to date with the latest innovations. In contrast, those who … Read more