Author: Usama Amin

Usama Amin is a Security blogger focusing on Cyber Security, Cloud Security, and IoT. He has worked as SR. Security Consultant for more than 10 years for industry-leading IT companies. Usama's experience also includes working as a legal expert witness for Cyber management. He writes about industry technology trends and best practices. He incorporates his views and his many years of experience to provide unique technology advice for people that manage and support Cyber solutions.

Developer security first is the future in the cloud. After all, the responsibility for cloud security rests with developers and DevOps teams, not IT security. In the days of the on-premises data center and early cloud adoption, application developers, infrastructure operations, and security roles were largely silent. In the cloud, this division of labor increases innovation time-to-market, reduces productivity, and invites unnecessary risk. In a data center environment, developers create software applications, IT teams create the infrastructure needed to run those applications, and security teams ensure that applications and infrastructure are secure. However, developers must build software within the constraints…

Read More

We explain what can happen after installing browser extensions using the most common families of malicious extensions as an example. We have probably all installed browser extensions at some point: an ad blocker, an online translator, a spell checker, or another type of extension. However, few of us stop to think: Is it safe? Unfortunately, these seemingly harmless applets can be much more dangerous than they seem at first glance. Let’s see what can happen. To do this, we’ll use data from a recent report by our experts on the most common families of malicious browser extensions. What Are Browser…

Read More

Do you want to know how to secure your Internet of things security? A smart home that opens on its own as soon as you stand in front of the door, lights that turn on with the snap of your fingers, a connected watch, or even bracelets that alert you to non-compliance with your diet. Do you feel like you’re in a science fiction movie? And yet, all of this is now made possible by new smart technology trends, otherwise known as the Internet of Things (IoT). Yet high-level attacks, coupled with a lack of knowledge about security practices and associated…

Read More

Since at least 2017, the number of ransomware attacks against industrial companies and Operators of Vital Importance (OVI) has increased significantly. WannaCry, LockerGoga, MegaCortex, Ryuk, Maze, and SNAKEHOSE (also known as Snake / Ekans): these ransomware names are only too well known and have cost victims from many sectors millions in ransoms and collateral damage. These incidents have also greatly disrupted and slowed down the physical processes that allow these companies to produce and deliver goods and services. Much has been said about the victims and the immediate consequences of ransomware campaigns launched against manufacturers. But the public debate misses…

Read More

Internet security is a generic term to describe the multitude of tactics used to protect a consumer and safeguard their activities and transactions over the Internet. What do you need to know about Internet Security? When you browse the Internet, you are exposed to all cyber threats. Gone are the days when attackers only targeted businesses and corporations. As an individual home user, you are equally vulnerable to attack. And if your kids use your computer to play or work, you’re just “upping the ante.” Cybercriminals can outwit even the best of us, and kids don’t stand a chance against…

Read More

The management of privileged accounts (PAM) is an increasingly important issue within companies. But why is it so important? Privileged Access Management: DEFINITION Privileged Access Management (PAM) solutions are solutions aimed at managing and protecting user accounts with high privileges (internal administrators and service providers) and managing administrative access to IS equipment. Privileged access thus makes it possible to modify the configurations of a system, create and delete user accounts, or access certain sensitive data. Privileged access must be controlled and supervised, because of its importance. What is the difference between user accounts and privileged accounts? There are two main categories of IT accounts: User accounts –  A…

Read More

A whaling attack refers to a spear phishing attack in which cybercriminals pose as C-suite executives or other business leaders. The attack involves a sophisticated phishing email and can have severe consequences for victims and their organizations. How does a whaling-type attack work? Whaling attacks involve the use of phishing emails. However, these emails tend to be more advanced than standard phishing messages. This is since whaling emails typically: They contain personalized information. Whaling type emails usually include information about the recipient and the organization of it. They seem urgent. A whaling email may include terms and phrases that indicate…

Read More

Taki scenariusz umożliwia Overlord – gra, która kiedyś zachwycała graczy niezależnie od wieku, a o której dziś wielu niestety zapomina. W produkcji wcielamy się w budzącego grozę bohatera i zakuci w potężną zbroję oraz arsenałem plag oraz straszliwych czarów pod ręką, ruszamy na podbój świata. W sianiu zniszczenia pomagają oddane nam chochliki, a na końcu tej niełatwej ścieżki stoi nagroda w postaci tytułu Lorda Despoty. Gry akcji do 10 zł. 30 gier za parę dyszek – Steam Winter Sale The Orange Box zawiera obie te pozycje – wraz z obydwoma dużymi dodatkami do HL2, czyli Episode One i Episode Two.…

Read More

System prądów atlantyckich, który wpływa na pogodę na całym świecie, może załamać się już pod koniec lat 30. XXI wieku – sugerują naukowcy w nowym badaniu. Może to być katastrofa na skalę planetarną, która zmieni pogodę i klimat. Kim był założyciel Comarchu, Janusz Filipiak? Wykładał na Akademii Górniczo-Hutniczej od 1991 r. Po powrocie z Australii, gdzie też pracował jako wykładowca. “Na Antypodach przyzwyczaił się do pracy w reżimie kooperacji uczelni z przemysłem i biznesem. Chciał ten model powtórzyć w Polsce” — pisał Forbes. Kim jest Anna Pruska, prezeska Comarch? Stan zdrowia biznesmena pogorszył się nagle zaledwie trzy miesiące temu.Szczególnym zainteresowaniem…

Read More