Author: firstname.lastname@example.orgemail@example.com According to sources there are some questions raised about an artificial intelligence bot which is easily accessible on google named ChatGPT AI. It’s an Open AI tool which is free of cost. This bot is used in many… Read More »ChatGPT AI utilized to create malware
Msdt.exe is an executable exe file that belongs to the Diagnostics Troubleshooting Wizard process which comes along with the Microsoft Windows Operating developed by Microsoft.Windows utility msdt.exe is used to run various Windows troubleshooter packs. Indicator of Compromise: Look for… Read More »CVE 2022-30190 Zero Click Zero Day in msdt
Global Digital Security becomes EC-Council’s New Authorized Training Center to make an impact in Cyber Security Education
EC-Council, a global leader in cybersecurity certifications, appoints Global Digital Security as an authorized training center. Global Digital Security is a niche organization offering training and consulting services in Cyber Security, Incident Response and Digital Forensics. Considering the demand and… Read More »Global Digital Security becomes EC-Council’s New Authorized Training Center to make an impact in Cyber Security Education
Train and Get Globally Recognized Certifications! Preliminary start in this industry can be through started training in Information Security and getting an industry recognized certification! CISSP can be a good start! CISSP Workshop – Global Digital Security! If technical aspects… Read More »How to get started in Cyber Security?
Cyberattacks increased by 50% globally between 2020 and 2021 alone (Check Point, 2022). As a result, demand is rising throughout the United States and internationally for cybersecurity professionals with the breadth of training and experience necessary to handle these growing… Read More »The Top Five Job Roles for Certified Cybersecurity Technicians
Tips for newbie forensicators! Accuracy : Forensics is lot about accuracy! Reaching accurate results can play an important role in what that you and the case would accomplish! Few tips to enhance your accuracy! 1.Try not to type in values… Read More »Forensic notes from the trenches!
We all have numerous passwords, which we require to protect! There is a mechanism to make this process simpler, password managers can do it for us! One application for this will be Keepass! You just got to remember your master… Read More »Security and Usability together! Make your Logins smoother!
Understanding Apache Log4J: Java is a programming language , its object oriented and high level language. Used for developing various apps and games etc. API : (Application programming interface ) it works as an agent for communication and services between two clients JNDI : ( java naming and directory interface) It is an API which… Read More »ApacheLog4J Vulnerability and Remediation
The overall economic cost of cybercrime is expected to reach more than USD 133 billion by the end of the year, with attacks ranging in scope from breaches of a single computer to thefts of as many as 3 billion records (Lazic, 2021). In 2019 alone, 63.8% of businesses were targets of phishing or social… Read More »Why You Should Become a Certified Cybersecurity Technician