Open in app

Sign In

Write

Sign In

Barry Greene
Barry Greene

225 Followers

Home

About

Feb 5

Principles to invest in Linkedin for an Effective Impact

We have an ocean of articles to explain how to use Linkedin for social media marketing. We don’t have as many articles that explain how to use Linkedin for an Effective Impact on people. Online social selling tools are human communications tools. People forget that E-mail, chat, Facebook, Linkedin, MySpace…

Social Media

21 min read

Principles to invest in Linkedin for an Effective Impact
Principles to invest in Linkedin for an Effective Impact
Social Media

21 min read


Dec 29, 2022

Loading Spoofer to Fight DDoS

(Last Updated On: January 3, 2023) Do you run a network? Do you secure an organization? Do you build applications? Do you want DDoS Attacks to be easy? Of course not! Everyone running, securing, or building something on the Internet does not want it easy to attack that service. We’re…

Ddos Attack

2 min read

Loading Spoofer to Fight DDoS
Loading Spoofer to Fight DDoS
Ddos Attack

2 min read


Aug 14, 2022

Don’t let your Firewalls be STUN DDoS Reflector.

(Last Updated On: August 13, 2022) Your firewalls can be used as a STUN DDoS reflector to attack others on the Internet. Open UDP firewall ports for STUN (Session Traversal Utilities for NAT) are being exploited for DDoS reflection. Your network is most likely one of those networks. Shadowserver now…

Cybersecurity

3 min read

Don’t let your Firewalls be STUN DDoS Reflector.
Don’t let your Firewalls be STUN DDoS Reflector.
Cybersecurity

3 min read


May 9, 2022

New DNS Cache Poison Attacks put IoT devices of all types at risk!

(Last Updated On: May 9, 2022) Nozomi Networks find an easier path for DNS Cache Poison Attacks on ICS, CPEs, and other IoT devices. Nozomi Networks disclosed long-term and persistent vulnerability with all versions of uClibc and uClibc-ng (see Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk by Giannis Tsaraias and Andrea Palanca | May 2, 2022). …

DNS

12 min read

New DNS Cache Poison Attacks put IoT devices of all types at risk!
New DNS Cache Poison Attacks put IoT devices of all types at risk!
DNS

12 min read


Nov 26, 2021

Bad Guys are Scanning Your Network!

(Last Updated On: November 25, 2021) Bad guys are scanning your network. They are finding all the vulnerabilities exposed to the Internet. The vulnerable systems, critical devices, and other ways to break into your network. When ransomware, malware, botnets, and other break-ins happen, people wonder, “how did the threat actors…

Attack Surface Management

5 min read

Bad Guys are Scanning Your Network!
Bad Guys are Scanning Your Network!
Attack Surface Management

5 min read


Nov 21, 2021

How do Security Experts surf the tidal wave of security news?

(Last Updated On: November 20, 2021) Have you ever wondered what security professionals review each day? How do they keep up with the security news? What sources do they use? If you are new to security, what sources shall you track? We are overwhelmed with a deluge of cybersecurity news…

Cybersecurity

3 min read

How do Security Experts surf the tidal wave of security news?
How do Security Experts surf the tidal wave of security news?
Cybersecurity

3 min read


Sep 6, 2021

“Backups” will not save you from a Ransomware Incident — SENKI

(Last Updated On: September 5, 2021) “What do you mean the backups don’t work? I thought you said backups would save us from a Ransomware incident?” Good backups are the #1 recommendation you will see in all “Ransomware Defence” guides. We have a problem in the industry. These “ransomware guides”…

Ransomware

8 min read

“Backups” will not save you from a Ransomware Incident — SENKI
“Backups” will not save you from a Ransomware Incident — SENKI
Ransomware

8 min read


Sep 1, 2021

Security does not have to be a C-Suite Afterthought

(Last Updated On: September 1, 2021) It is frustrating when “Security” is always an afterthought in the C-suite. “Why is the C-Suite always de-prioritizing security?” Even with all the cyber-criminal threats, people find that the C-suite is constantly putting the cost to mitigate that threat on the backburner. It is…

Resilence

4 min read

Security does not have to be a C-Suite Afterthought
Security does not have to be a C-Suite Afterthought
Resilence

4 min read


Jun 9, 2021

Open SMTP (Email) Servers on Your Network

(Last Updated On: June 8, 2021) Do you know if you have open SMTP servers on your network? In May, Qualys released 21 vulnerabilities to Exim (see Qualys Security Advisory 21Nails: Multiple vulnerabilities in Exim). Exim is a popular Mail Transfer Agent (MTA) available on Unix operating systems and comes…

Security Vulnerabilities

2 min read

Open SMTP (Email) Servers on Your Network
Open SMTP (Email) Servers on Your Network
Security Vulnerabilities

2 min read


Nov 12, 2020

DDoS Extortionist’s Behaviors

Using DDoS Extortionist’s Behaviors as a tool to defend your organization. Smart and prepared organizations use DDoS Extortionist’s Behaviors as a Defensive Tool. We have a long history of DDoS Extortionists. In the early 2000s, we had DDoS Extortionists who would threaten “gambling sites” with a DDoS Attack 30 minutes…

Ddos Extortion

8 min read

DDoS Extortionist’s Behaviors
DDoS Extortionist’s Behaviors
Ddos Extortion

8 min read

Barry Greene

Barry Greene

225 Followers
Following
  • Teri Radichel

    Teri Radichel

  • Michael Lin

    Michael Lin

  • Katie Jgln

    Katie Jgln

  • The Good Men Project

    The Good Men Project

  • Tim Denning

    Tim Denning

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech