The case for cyber ranges - Part 3 I heard a comment the other day that really clicked something in my mind. The quote was "You don't know how vulnerable you are until you fail". This quote could have
Recently, an old vulnerability targeting VMware ESXi has been spotted in the wild. The vulnerability we are talking about is CVE-2021-21974 and exploits the OpenSLP service running on port 427. A mali
ChatGPT is making waves as the Internet's favorite chatbot. Apart from being hailed as the replacement for conventional Search Engines, its text generation capabilities are surprising everyone. To dem
The case for cyber ranges – Part 2 In my previous blog post I was telling you why you need continuous, hands-on security training to be prepared for a cyber incident. Let me tell you the story of a se
Abstract BitTorrent is a peer-to-peer file sharing protocol used to distribute large amounts of data over the internet. It works by allowing users to download small pieces of a file from multiple sour
The Case for Cyber Ranges – Part 1 I am a kind of unique nerd. I'm a nerd at heart but I also LOVE golf! I know, golf is not your typical nerd game. I have never played a video game before in my life,
In ATI, Polymorphic malware refers to samples of malware derived from a common malicious codebase that are changed in order to evade detection while remaining functionally malicious. The samples can h
Network Visibility + Security
Fail Good and Fail Safely in a Cyber Range Environment
Bob DuCharme 2023.03.07
4 min read
#Network Security #Cybersecurity #Software
Network Visibility + Security
Remote Code Execution with ESXi - CVE-2021-21974 VMware ESXi Heap Overflow
Cristian Done 2023.02.27
10 min read
#Network Security #Cybersecurity
Network Visibility + Security
A Quick Look into ChatGPT's Network Traffic
Anubhab Sahu 2023.02.22
5 min read
#Network Security #Network Visibility #Data Privacy
Network Visibility + Security
The Fog of War in Incident Response Awareness
Bob DuCharme 2023.02.03
7 min read
#Network Security #Cybersecurity #Software
Network Visibility + Security
KRPC Protocol: The Language of Torrent Peers
RAKESH SEAL 2023.01.31
14 min read
#Network Security #Network Analysis Apps #Network Test #Network Visibility
Network Visibility + Security
A Golfer’s Guide to Not Buying Security
Bob DuCharme 2023.01.10
4 min read
#Network Security #Cybersecurity #Software
Network Visibility + Security
ATI Polymorphic Android Malware
Ayan Saha 2022.12.23
11 min read
#Network Security #Cybersecurity