Microsoft has released a fix for a critical Remote Code Execution vulnerability (CVE-2019-0708) in remote desktop services that affects older versions of windows used by many organizations worldwide, most notably in the healthcare and finance sectors, but also others as well. As this vulnerability is placed at the pre-authentication stage and does not require any […]
Ramadan, 2019
Ramadan commemorates when the sacred Quran was revealed to Muhammad. At the spotting of the crescent moon, Muslim families and communities will honor this revelation by beginning a month of inward reflection, spiritual renewal, and prayer. During Ramadan, Muslims fast from dawn to dusk, recite passages from the Quran, and perform benevolent acts of charity […]
Oracle Java, requiring Commercial license
Using Java for your projects, and testing? You may have gone and updated recently and noticed the updated license terms. The new license permits certain uses, such as personal use and development use, at no cost. Those using this in the workplace, not so much. Oracle is encouraging those downloading java from their site to […]
Here are some way to know if you are putting your client’s data at risk. 1. YOU ARE QUICK TO CLICK ON HYPERLINKS. Avoid clicking on links in emails, especially if they are from an unknown sender or sent without context. A good way to verify links before clicking is to hover your mouse over […]
Cybersecurity: New NJ Privacy Law
You may have started to read about changes that may directly affect your organization. In response to Europe’s new GDPR law. In response to Europe’s new GDPR law, states have begun to draft and implement additional privacy laws and regulations. My home state of New Jersey is now attempting to lead the charge forward in […]
Intrusion Prevention with Fail2Ban
Fail2Ban is an intrusion prevention software framework that protects computer servers from brute-force attacks. Written in the Python programming language, it is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, for example, iptables or TCP Wrapper. Wikipedia To assist in further locking down the exposed SSH […]