• CyberBakery
  • Cybersecurity
  • Linux
  • Home Lab
  • About CyberBakery
  • News
  • Twitter
Sign in Subscribe

The Problem of Passwords
CyberSecurity

The Problem of Passwords

Password management in 2023 is still one of the most significant cybersecurity challenges. Security researchers often point out that the problem lies in “people” and their ability to remember thousands of usernames and passwords. In this post, I will deal with some of the challenges to maintaining our secrecy and
Feb 3, 2023 5 min read
Call Spoofing: How do scammers use your phone numbers to commit fraud?
CyberSecurity

Call Spoofing: How do scammers use your phone numbers to commit fraud?

In recent times, phone scams have been on the rise in Australia. I receive at least 8-10 calls every day from different numbers, including overseas numbers. There is very much a possibility that your number may also be used in these scam calls. Such fraudulent use of real numbers by
Feb 3, 2023 4 min read
Keep Calm and Patch On!! Log4Shell is just not another Zero-Day
CyberSecurity

Keep Calm and Patch On!! Log4Shell is just not another Zero-Day

Originally published at https://cyberbakery.net/ on Dec 19, 2021 On10th Dec 2021, a zero-day vulnerability was announced in Apache’s Log4j library, which has made Log4shell one of the most severe vulnerabilities since Heartbleed. Exploiting this vulnerability is trivial, and therefore we have seen new exploits daily since the
Feb 3, 2023 7 min read
Whose Responsibility Is For Good Cyber Hygiene?
CyberSecurity

Whose Responsibility Is For Good Cyber Hygiene?

It was just over thirty years when Tim Berners-Lee’s research at CERN, Switzerland, resulted in World Wide Web, which we also Know as the Internet today. Who would have thought, including Tim, that the Internet will become such a thing as today? This network of networks impacts every aspect
Feb 3, 2023 6 min read
Application Programming Interface (API): Cybersecurity Risks and Mitigation Strategies
CyberSecurity

Application Programming Interface (API): Cybersecurity Risks and Mitigation Strategies

Originally published on cyberbakery.net Globally, businesses leveraged the benefits of transforming their businesses by adopting new ways of doing business and delivering their products to the market quickly and efficiently. The digital transformation has made a distinctive contribution to this effort. Organisations use modern and efficient applications to deliver
Feb 3, 2023 7 min read
Cybersecurity Challenges Of The “Interconnected World”
CyberSecurity

Cybersecurity Challenges Of The “Interconnected World”

Originally published at https://cyberbakery.net on February 19, 2022. The Interconnected World of billions of IoT (Internet of Things) devices has revolutionised digitalisation, creating enormous opportunities for humanity. In this post, I will be focussing on the uniqueness of the security challenges presented by these connected IoT devices and
Feb 3, 2023 5 min read
What Cybersecurity Can Learn From Circular Economy?
CyberSecurity

What Cybersecurity Can Learn From Circular Economy?

Originally published at https://cyberbakery.net on February 5, 2022. Cybersecurity and Circular Economy (CE) are not the terms taken together. Cybersecurity is often related to hacking, loss of privacy or phishing, and CE is about climate change and environmental protection. However, cybersecurity can learn quite a few things from
Feb 3, 2023 4 min read
DevOps Developer: An Attractive Target For Hackers.
CyberSecurity

DevOps Developer: An Attractive Target For Hackers.

Originally published at https://cyberbakery.net on January 23, 2022. Agile software development methodologies have become popular in the last decade or so. One such methodology, DevOps, has established itself among the most used methodologies across various industries throughout the globe. However, for security teams, this popularity of DevOps has
Feb 3, 2023 5 min read
The Zero-Day Brokers: A grey market for zero-day exploits
CyberSecurity Featured

The Zero-Day Brokers: A grey market for zero-day exploits

Originally published at https://cyberbakery.net on November 20, 2021. In the past, I have talked about zero-day vulnerabilities and the risks they pose. This post will focus on a grey market ecosystem, where zero-day exploits are bought and sold. To stay within the context, let me first define some
Feb 1, 2023 4 min read
Cybersecurity Challenges of Mergers and Acquisitions
CyberSecurity Featured

Cybersecurity Challenges of Mergers and Acquisitions

Originally published at https://cyberbakery.net on November 13, 2021. We hear about new mergers and acquisitions(M&A) daily. Companies announce acquiring another in multi-million/billion-dollar deals. Most of the time, such deals are good news for investors and companies. However, cybersecurity is often overlooked in such transactions exposing
Feb 1, 2023 6 min read
Page 1 of 1
© 2023
  • Sign up
Powered by Ghost