How Do You Conduct an Information Security Risk Assessment?

Information security risk assessments are crucial for any businesses that deal with any sensitive information that could potentially cause harm if accessed, shared, modified, or deleted. In this article, we cover how your business can benefit from a security risk assessment, how they are conducted, and how you can use the assessment findings to improve […]

Vulnerability Alert: TLStorm 2

Risk Rating: CRITICAL Affected Products: Avaya series; Aruba Affected Version: ERS3500/ERS3600/ERS4900/ERS5900; Aruba 5400R/3810/2920/2930F/2930M/2530/2540 Patched Version: N/A Vendor: Aruba and Avaya network switches Date: 04/05/2022 Introduction: Five critical vulnerabilities were identified within the various models of Aruba and Avaya network switches. The vulnerabilities affect the implementation of the TLS stack within those devices. Insecure memory management […]

Vulnerability Alert: CVE-2022-21449 – Psychic Signatures

Risk Rating: HIGH   Affected Product: Java SE & Oracle GraalVM Enterprise Edition product of Oracle Java SE  Affected Version: Versions 15, 16, 17 & 18, Oracle GraalVM Enterprise Edition: 21.3.1 & 22.0.0.2  Patched Version: April 2022 Critical Patch Update   Vendor: Oracle   Date of Disclosure: 19.04.2022  Introduction: A vulnerability exists within the implementation of ECDSA cryptographic […]

Vulnerability Alert: CVE-2022-20773 – Default SSH Host Key

Risk Rating: HIGH Affected Product: Cisco Umbrella Virtual Appliance  Affected Version: Virtual Appliance <= 3.3.2  Patched Version: Please see Remediation(s) section for more details.  Vendor: Cisco  Date of Disclosure: 20.04.2022  Introduction: Cisco Umbrella Virtual Applications contains a vulnerability in the key based SSH authentication mechanism which could potentially allow a remote unauthenticated attacker to impersonate […]

Nestlé Operating in Russia Causes Data Breach

Nestlé Operating in Russia

Another war was launched by a popular anonymous hacktivist on companies who still choose to run in Russia and pay taxes to the Russian Government. After Nestlé decided to continue operating in Russia the anonymous hackers threatened to attack them and eventually hacked into their system, leaking 10GB worth of sensitive data. Impact On 22nd […]

How To Write Phishing Emails

how to write a phishing email

Year after year, statistics show phishing attacks continue to rise. Why? Because they work, and this simple attack brings results. Consequently, this attack has evolved and become more sophisticated and harder to identify. Gone are the days of the error-filled 419 emails from a Nigerian Prince requesting your account details to hide money offshore. Instead, […]

The Principles of Social Engineering

principles of social engineering

Social engineering is a term used for a wide variety of activities used by threat actors to manipulate or trick end users into bypassing security controls or providing sensitive information (such as login credentials) —that they then use to obtain unauthorised access to the systems they target. It’s not a new threat. It’s been around […]

Risk Crew