article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

Two exam formats are available: a four-hour streamlined Computer Adaptive Testing (CAT) exam that adjusts questions and scoring based on answers to initial questions, or the full linear exam, which takes six hours. The CEH certification from the EC-Council was introduced in 2003 and is now in version 11. CEH (Certified Ethical Hacker).

article thumbnail

Expert developed a MetaSploit module for the BlueKeep flaw

Security Affairs

A security expert has developed a Metasploit module to exploit the critical BlueKeep vulnerability and get remote code execution. The security researcher Z??osum0x0 osum0x0 has developed a module for the popular Metasploit penetration testing framework to exploit the critical BlueKeep flaw. According to Z??osum0x0,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

First Cyber Attack ‘Mass Exploiting’ BlueKeep RDP Flaw Spotted in the Wild

Security Affairs

Over the last months, many security experts have developed their own exploit code for this issue without publicly disclosing it for obvious reasons. Microsoft has released patches for Windows 7, Server 2008, XP and Server 2003. The researcher Z??osum0x0 ” concludes the expert.

article thumbnail

NSA urges Windows Users and admins to Patch BlueKeep flaw

Security Affairs

Many security experts have already developed their own exploit code for this issue without publicly disclosing it for obvious reasons. Microsoft has released patches for Windows 7, Server 2008, XP and Server 2003. Security experts believe it is a matter of time before threat actors will start exploiting it in the wild.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Through tenures at Citrix, HP, and Bugcrowd, Jason Haddix offers his expertise in the areas of penetration testing , web application testing, static analysis, and more.

article thumbnail

UNRAVELING EternalBlue: inside the WannaCry’s enabler

Security Affairs

The Metasploit Framework is a Ruby-based, modular penetration testing platform that enables you to write, test, and execute exploit code. The Metasploit Framework contains a suite of tools that you can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection.