Hot Topics
Cisco VIRL vs GNS3 1.x -

I have been meaning to write this blog for a while, as I have regurgitated this information on multiple occasions. 

2 days ago | 0
Government Public-Private Partnerships for Cyber Security -

Do Government Partnerships with Private Organizations Make Sense in Cyber Security? Recent cyber-attacks such. 

3 days ago | 0
Cascading Virtual Domains on a Fortigate UTM -

Virtual firewall instances within a single hardware appliance have been a hot topic for a few years now, enabling. 

4 days ago | 0

Cisco VIRL vs GNS3 1.x

By Aamir Lakhani | On Fri, Jan 30th, 2015 - No Comments »
logo_gns3_small_thumb[2]

I have been meaning to write this blog for a while, as I have regurgitated this information on multiple occasions on the Cisco Learning Network.  I recently read Brandon Carroll’s blog post comparing VIRL and GNS3, with some excellent bullet points on how to decide what is right for you. Brandon’s post does assume a bit of understanding of the underlying technologies used. 

Government Public-Private Partnerships for Cyber Security

By Aamir Lakhani | On Thu, Jan 29th, 2015 - No Comments »
government partnership for cyber security

Do Government Partnerships with Private Organizations Make Sense in Cyber Security? Recent cyber-attacks such as JP Morgan Chase, Sony Entertainment, Home Depot, and Target not only caught the attention of the media and public bringing into light how fragile the systems that guard our data is, but also caught the attention of the US Government where they played a direct role in investigating. 

Cascading Virtual Domains on a Fortigate UTM

By Blog | On Wed, Jan 28th, 2015 - No Comments »
FortiGate-800C-side

Virtual firewall instances within a single hardware appliance have been a hot topic for a few years now, enabling customers to do more with less hardware. This has never been more true then now, especially within multi-tenant environments and constantly evolving security regulations surrounding PCI, HIPAA, NERC, etc. Fortinet calls these virtual firewalls Virtual Domains, Cisco calls them. 

Penetration Testing with Raspberry Pi

By Aamir Lakhani | On Tue, Jan 27th, 2015 - No Comments »
6435OT_B04065_Penetration testing with raspberry Pi_frontcover

My good friend, partner in crime, and co-author Joseph Muniz (who you may know as The Security Blogger) and I are very proud to present our second book … “Penetration Testing With Raspberry Pi“. This book can be found on Packt’s website HERE and should start being seen on most online stores such as Amazon, Barns and Noble the next few days. Our first book talked about web penetration. 

Paper: Nesting doll: unwrapping Vawtrak

By Aamir Lakhani | On Tue, Jan 27th, 2015 - No Comments »
matryoshka

Raul Alvarez unwraps the many layers of an increasingly prevalent banking trojan. Banking trojans remain one of the most prevalent kinds of malware. Among them, trojans based on Zeus have long been the most prevalent, but in recent months a relatively new trojan has been challenging the reign of Zeus: Vawtrak. Also known as Neverquest or Snifula, Vawtrak initially targeted users of Japanese. 

Core 4 “Back to the Basics”

By Anthony Giandomenico | On Mon, Jan 26th, 2015 - No Comments »
Core 4 Basics

In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources to both protect against and respond to rapidly evolving cyber-threats. IT professionals tasked with protecting their companies’ cyber assets are facing growing challenges: Cyber threats are getting more advanced; Networks are getting more complex leading. 

Your Personal Files Are Encrypted-CBT Locker (Critoni Ransomware)

By Blog | On Wed, Jan 21st, 2015 - No Comments »
your-personal-files-are-encrypted

If you are seeing  “Your personal files are encrypted” message – you are in a big trouble! Ransomware is a category that includes infections that block or encrypt the files on users’ computers, and ask for a payment to be made in order for users to be able to retake control over their files. In the case of CBT-Locker (Critoni) Ransomware, you will be presented with a message placed. 

What is Your Password?

By Aamir Lakhani | On Tue, Jan 20th, 2015 - No Comments »
JK Passwords

President Obama just unveiled a number of proposals to crack down on hackers. It’s great that the government is working on this but we need to do a better job of protecting ourselves. So we sent a camera out onto Hollywood Boulevard to help people by asking them to tell us their password.    

njRAT Malware – remote control malware

By Aamir Lakhani | On Tue, Jan 20th, 2015 - 1 Comment
Real Hacking looks like this :)

Warning: The ideas, concepts and opinions expressed in this blog are intended to be used for educational purposes only. The misuse of the information from this article can result in criminal charges brought against the persons in question. Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials. One of the most popular malware. 

Blackhat Movie Review (2015)

By Aamir Lakhani | On Sat, Jan 17th, 2015 - 1 Comment
imageblackhat-1

Spoiler warning: This article contains plot details from Blackhat the movie (2015). It is hard not to root for Michael Mann. He gave us The Last of the Mohicans and Heat. The Insider and Ali held their own, and I can’t say I didn’t enjoy Collateral. Then things started to get a little strange with Miami Vice, and Public Enemies. One of the most visually stunning directors opts for grittiness.