Category: Hyper-V
OpnSense on Hyper-V | How to add VLANs as Interfaces
- By Alexander C. Hubbard in Homelab, Hyper-V, Networking, OPNSense
-
October 13, 2022
- 4 mins to read
- Leave comment
CentOS 7 Minimal Installation on Hyper-V
- By Alexander C. Hubbard in Homelab, Hyper-V
-
January 31, 2018
- 8 mins to read
- 1 comments
Blog Archives
account ach_sysadmin active directory ad CentOS Cisco Cisco Switch cybersecurity Dell Dell Stack Dell Switch ESXi Firewall Homelab Home Lab Hosts Hyper-V m365 microsoft Monitoring Networking Putty Security server server 2019 Switch Switches sysadmin system admin Ubiquiti Ubuntu udmp Unifi unifi dream machine unifi dream machine pro vciso Virtual Virtualization Virtual Machines VLANs VMWare WiFi Windows windows server WinSCP
Site Search
![@ach_sysadmin](https://achubbard.com/wp-content/plugins/instagram-widget-by-wpzoom/dist/images/backend/icon-insta.png)
What are some common frameworks that I see as a vCISO with my clients?
#ciso #vciso #nist #cybersecurity #frameworks #cmmc #pcidss
8 months ago
What are cybersecurity frameworks?
#vciso #ciso #cybersecurity #infosec #nist
8 months ago
PART 11 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 10 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 9a of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 9 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 8 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 7 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago
PART 6 of 11 -In the realm of cybersecurity, zero-day vulnerabilities pose significant threats to organizations and individuals alike. A zero-day vulnerability refers to a software flaw or weakness that is exploited by hackers before the software vendor becomes aware of its existence or has the opportunity to develop a patch. Because there is zero-day time between the discovery of the vulnerability and the release of a fix, attackers can launch attacks and compromise systems without any warning, making these vulnerabilities extremely dangerous. As someone who spends a significant amount of time with clients, I've seen a rise in this over the last say 6 months or so. Lately they've been appearing for VPN products.
#zeroday
#cybersecurity
#softwareflaws
#exploitation
#softwarepatches
#attacksurface
#networksecurity
#intrusiondetectionsystems
#networksegmentation
#allowlisting
#behavioralanalysis
#anomalydetection
#securityawareness
#socialengineering
#responsibledisclosure
#Bugbounty
#Cyberthreats
#Vulnerabilitysharing
#ethicalhacking
#patchmanagement
#thecybersecuritymindset
12 months ago