Something I regularly do, is review security against attacks and remediate if required. This example is a simple SQL injection attack. There is a few things in addition to code…
Teaming up today with a post from MindofaRaptor.com
www.MindofaRaptor.com Cyber Security/Hacker Operating Systems I was recently informed of a new operating system that helps cover all of the security needs for those working in the Cyber Security industry,…
Phishing TEXT Scam
Watch out for the latest Phishing TEXT Scams. This week they are getting a bit lazy and less convincing. This #Fake #Halifax text has just been received. SUSPICIOUS activity!! On…
Phishing Email – TV Licensing – Don’t be a victim
Watch out for the latest Phishing Email Scams. They are getting ever more convincing. This TV Licensing email just came through. Sent from "Trusted Sender" No spelling or grammar issues…
Dark Web Monitoring
What solution did you use?? I'm currently looking at the following products Digital Shadows Breach Alert (RepKnight) Onion Scan (Opensource) Digital Shadows and Breach Alert both seem to scan the…
How To Access A SQL Server 2008 Databases WITHOUT SA (SysAdmin) Credentials
Challenge : How to make a backup of a SQL 2008 database without knowing any working credentials. Log on to the Windows 2008 R2 server running SQL Server 2008 as…