4th Floor, 4 Tabernacle Street London EC2A 4LU

Datadog And AWS Partner on Observability & Security

Datadog And AWS Partner on Observability & Security Datadog has just announced a global partnership with Amazon Web Services, Inc. (AWS) on observability and security, as well as to work together for the development and the delivery of tighter product alignment in the future. According to the monitoring and security platform for cloud applications, Datadog […]

UK Gov Passes New Cyber Bill for Personal Tech Products

UK Gov Passes New Cyber Bill for Personal Tech Products The UK government has just introduced the new cyber law – passing ‘The Product Security and Telecommunications Infrastructure (PSTI) bill’, designed to better protect consumers from attacks by hackers on their personal tech products and internet-connectable devices. As announced, the new law include a ban […]

Install Root Certificate Synology

SSH to your nas drive Upload your pem certificate sudo su – Backup first; cp /etc/ssl/certs/ca-certificates.crt /var/tmp/ca-certificates.crt.bak cat yourfile.pem >> /etc/ssl/certs/ca-certificates.crt     Note: This is not officially supported by synology. A future Update could restore the list of root-ca-certs to default and then you’d have to import the cert again.

Microsoft Launches Security Program for Nonprofits

Microsoft has just announced the launch of a Security Program – made up of a set of security offerings built to protect nonprofits organizations against threats, by providing proactive monitoring and notification in the case of a nation-state attack as well as to help enhance their security posture based on their environment. Built to complement […]

CompTIA Expands Cybersecurity Footprint in the UK

CompTIA Expands Cybersecurity Footprint in the UK CompTIA has just announced the expansion of its cybersecurity information sharing and Analysis Organization (CompTIA ISAO) to the UK with plans to serve as the focal point for dealing with cyber-threats among technology vendors, MSPs, solution providers, integrators, distributors, and business technology consultants. According to the nonprofit association […]

6 Top Guide for Effective IT Support Services

6 Top Guide for Effective IT Support Services Errors, technical glitches and disasters are terms very common in the IT field and mostly not avoidable,  creating the need for every IT service provider to put in place a proper IT support services team that can effectively respond to these IT issues, errors, glitches or disaster […]

Reverse Proxy into Linux via SSH

Instructions to establish a reverse SSH proxy on server startup. Useful for setting up a server behind gateways/firewalls.   Install SSH keys on the remote and local server. Note the command should work independently before setting up as a service. /usr/bin/ssh -NT -o “ServerAliveInterval 60” -o “ServerAliveCountMax 3” -o “PubkeyAuthentication=yes” -o “PasswordAuthentication=no” -i /sshtunnel/.ssh/id_rsa -R 2220:localhost:22 […]

Heartbleed – OpenSSL Application Source Code Example

[perl] /* * CVE-2014-0160 heartbleed OpenSSL information leak exploit * ========================================================= * This exploit uses OpenSSL to create an encrypted connection * and trigger the heartbleed leak. The leaked information is * returned within encrypted SSL packets and is then decrypted * and wrote to a file to annoy IDS/forensics. The exploit can * set […]

Heart Bleed – Exploit Example Code

Heart Bleed – Exploit Example Code If you need to test your server for the vulnerability, here is a simple Python script… [python] #!/usr/bin/python import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage=’%prog server [options]’, description=’Test for SSL heartbeat vulnerability (CVE-2014-0160)’) options.add_option(‘-p’, ‘–port’, type=’int’, default=443, […]