In here I want us to take a look at a few job roles within a company that pay attention to infosec and protection of cyber security of it’s digital assets. Those roles are not necessary exists within every company and all of those roles. but in some cases a single role might take responsibility…
What is WAF?
A Web Application Firewall (WAF) stands as a defender against the threats that target web applications. Acting as a virtual barrier between the web application and the internet, a WAF monitors, filters, and blocks malicious traffic, safeguarding the application from various cyber threats. The approach of security comes from WAF means that the network of…
Lead Auditor ISO 27001
A Lead Auditor for ISO 27001 is a professional who is responsible for planning, leading, and conducting audits of an organization’s Information Security Management System (ISMS) against the requirements of the ISO/IEC 27001 standard. The role of a Lead Auditor is critical in ensuring that an organization’s ISMS is effective, compliant, and capable of protecting…
300GB Data Breach of Israeli Justice Ministry
In a bold and audacious move, the hacking collective known as Anonymous has once again made headlines by allegedly targeting the servers of the Israeli Ministry of Justice. In a video message posted online, the group announced that they had successfully perform a data breach to the ministry’s servers in multiple operations, resulting in the…
Supply Chain Attack
Businesses and organizations rely heavily on third-party vendors and suppliers to provide essential services and products. While this interconnectedness brings efficiency and convenience, it also opens up new vulnerabilities. One such vulnerability is a supply chain attack, a sophisticated cyber attack that targets the supply chain network to compromise an organization’s systems or data. Understanding…
Linux Backdoor 2024
Linux, the widely used open-source operating system, narrowly escaped a high risk cyber attack over the weekend, thanks to one volunteer. The attack targeted a recent release of XZ Utils, a tool used in nearly every Linux distribution to compress large files, making them easier to transfer. It’s important to mention that XZ utils is…
ELVIS Act: Protecting Artists’ Voices in the Age of AI
Imagine a world where AI can replicate the singing voices of your favorite artists, creating new songs that sound indistinguishable from the real thing. While this may seem like a futuristic concept, it’s already a reality, raising concerns about the unauthorized use of AI-generated voices in the music industry. In response to these concerns, Tennessee…