Where to Report Cybercrime in the United States?

Where to Report Cybercrime in the United States?

Threats & Vulnerabilities, Tutorials
Cybercrime is a growing concern in the United States as people become increasingly reliant on information and communication technologies. In 2020 alone, the FBI estimated that more than $4 billion was lost to cybercrime in the country. As a result, it is crucial for individuals and businesses to know where to report cybercrime in case they become victims. The United States has several federal agencies that investigate online crimes, with the Federal Bureau of Investigation (FBI) taking the lead in this area. One key resource for reporting cybercrime is the Internet Crime Complaint Center (IC3), which serves as the nation’s central hub for collecting reports on internet-related crimes. Additionally, local law enforcement agencies can assist in filing formal reports and making appropriate referrals to other agencies. Understanding where to report cybercrime…
Read More
Step-by-Step Guide to Install Raspberry Pi OS on a Raspberry Pi Single Board Computer!

Step-by-Step Guide to Install Raspberry Pi OS on a Raspberry Pi Single Board Computer!

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Linux, Tutorials
Raspberry Pi OS is a Debian-based operating system developed by Raspberry Pi Foundations. It is the operating system that is specifically designed for the Raspberry Pi Single Board Computer board. And it s an excellent choice for anyone looking to start using and exploring the possibilities of DIY computing using Raspberry Pi boards. The operating system provides outstanding flexibility with respect to its hardware compatibility, allowing it to be used with a wide range of Raspberry Pi models. Additionally, the operating system is open source and free, providing users with access to its source code which can be edited and improved by anyone with advanced knowledge. Raspberry Pi OS carries many advantages over other operating systems when it comes to running Raspberry Pi. All these made Installing Raspberry Pi OS on a Raspberry…
Read More
How To Fix CVE-2021-43304(5)- Heap Buffer Overflow Vulnerabilities In ClickHouse Database Management System

How To Fix CVE-2021-43304(5)- Heap Buffer Overflow Vulnerabilities In ClickHouse Database Management System

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Linux, Programming & Scripting, Tutorials
Security researchers JFrog have disclosed total multiple new high severity vulnerabilities in ClickHouse, an open-source database management system (DBMS) dedicated to online analytical processing (OLAP). The list is made up of seven vulnerabilities, ranging CVSS score from 6.5 to 8.8. It’s been said that attackers could weaponize these vulnerabilities to leak memory contents, remote code execution, and even crash the servers. Users of the ClickHouse Database Management System should consider reading this post because a user with the lowest privileges can trigger all the vulnerabilities. It is must to learn How to Fix CVE-2021-43304(5)- Heap Buffer Overflow Vulnerabilities in ClickHouse Database Management System. What Is ClickHouse Database Management System? ClickHouse is an open-source, high-performance columnar OLAP database management system developed by Yandex. It enables DB admins to generate holistic analytical reports using SQL queries in…
Read More
How To Fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10?

How To Fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10?

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Attacks, Cyber Security, Data Breaches, Network Security, Pen Testing, Threats & Vulnerabilities, Tutorials, Windows
Security researchers recently disclosed an Information discloser vulnerability (CVE-2021-24084) in Windows 10, enabling an attacker to gain unauthorized file system access and read arbitrary files on the vulnerable system. Microsoft has released the patch in Feb 2021. Unfortunately, the patch has failed to fully fix the CVE-2021-24084 vulnerability. However, there is an unofficial patch released by Opatch which could be used as a workaround until Microsoft address this issue. Let’s see how to fix CVE-2021-24084- Information Discloser Vulnerability In Windows 10. Windows Affected By CVE-2021-24084: The good news is that the no Windows server operating systems are affected as the “Access work or school” vulnerable functionality doesn’t exist on the server operating system. No need to worry about the server platform. This vulnerability affects Windows 10 operating system, which is the most…
Read More
How to Fix 5 Vulnerabilities in NETGEAR RAX30 Router?

How to Fix 5 Vulnerabilities in NETGEAR RAX30 Router?

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Network Security, Threats & Vulnerabilities, Tutorials, Vulnerabilities
NETGEAR has addressed five vulnerabilities in the NETGEAR RAX30 Router model. These vulnerabilities in NETGEAR’s Nighthawk RAX30 allow attackers to monitor users’ internet activity, highjack internet connections, and redirect traffic to malicious websites or inject malware into network traffic when chained together. It’s important to know how to fix these 5 vulnerabilities in the NETGEAR RAX30 Router model at the earliest. A Short Note About NETGEAR RAX30 Router Model The NETGEAR RAX30 Router Model is a powerful WiFi 6 router that capable of delivering seamless 4K streaming to smart TVs, gaming consoles, and mobile devices with up to 2.4 Gbps wireless speeds. Equipped with a robust 1.5 GHz triple-core processor and three high-power antennas, this router ensures maximum wireless coverage for an improved WiFi experience. Additionally, NETGEAR Armor provides automatic…
Read More
Easiest Way to Create Certificates Using Web-Based GUI OpenSSL

Easiest Way to Create Certificates Using Web-Based GUI OpenSSL

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, INFOSEC, Tutorials
OpenSSL is the widely used PKI stack of libraries most likely used to create CSRs (Certificate Sigining Rewuest), Certificates, convert digital certificates from one to another format, verify or validate Certificates, export private keys from certificates, and build your own Certificate Authority. OpenSSL library will be included in the default list of packages on most non-Windows platforms like Linux and mac. However, Windows users will have to install OpenSSL on their Windows platform to work on it. What if you are not authorized to install the OpenSSL program on your Windows PC? Well, there is a quick solution to this problem. You can use the web-based GUI OpenSSL program on your Windows PC without installing it on your machine. All you need to have is a WebBrowser with an internet connection on your machine. Since it is used…
Read More
How to Fix CVE-2023-20036 And CVE-2023-20039- Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director (IND)?

How to Fix CVE-2023-20036 And CVE-2023-20039- Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director (IND)?

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Threats & Vulnerabilities, Tutorials, Vulnerabilities
The network devices manufacturer giant Cisco published an advisory on 19th April 2023 in which Cisco detailed Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director (IND). The vulnerability tracked as CVE-2023-20036 is a Critical severity vulnerability with a CVSS score of 9.9 out of 10. And the vulnerability tracked as CVE-2023-20039 is a Medium severity vulnerability with a CVSS score of 5.5 out of 10. Both the vulnerabilities are lice in the web-based user interface of affected Cisco IND. Since this flaw allows the authenticated attacker to to inject arbitrary operating system commands or access sensitive data of an affected device, it is most important to fix the CVE-2023-20036 And CVE-2023-20039 vulnerabilities. Let’s see how to fix CVE-2023-20036 And CVE-2023-20039, Command Injection and File Permissions Vulnerabilities in Cisco Industrial Network Director. A Short…
Read More
Three BGP Message Parsing Vulnerabilities in FRRouting Protocol Suite

Three BGP Message Parsing Vulnerabilities in FRRouting Protocol Suite

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Attacks, Cyber Security, Threats & Vulnerabilities, Tutorials
A recent analysis of seven different implementations of the Border Gateway Protocol (BGP) by Forescout Vedere Labs has uncovered three new vulnerabilities in the software implementation of version 8.4 of FRRouting. The three vulnerabilities in BGP include CVE-2022-40302, CVE-2022-40318, and CVE-2022-43681.  This blog will discuss these Message Paring vulnerabilities in FRRouting and how to mitigate the impact.   A Short Note About FRRouting FRRouting is an open-source internet routing protocol suite for Unix and Linux platforms. It offers a comprehensive set of protocols, including RIP, PIM, Babel, RIPv1, RIPv2, Is-Is, OSPFv2, OSPFv3, OpenFabric, PBR, RIPng, and VRRP. It also provides alpha support for NHRP and EIGRP.  FRR was initially introduced by the Quagga developers working under the Quagga project. They joined forces to build a routing protocol stack that could improve Quagga’s well-established…
Read More
What Is New in Kali Linux 2023.2? And, How to Upgrade Kali Linux to 2023.2?

What Is New in Kali Linux 2023.2? And, How to Upgrade Kali Linux to 2023.2?

Application/Appliance, Cloud & OS Platforms, Cyber Security, Network Security, Pen Testing, Tutorials
Offensive Security came up with its first release after its 10th-anniversary release (Kali Linux Purple) on 13th March 2023. Offensive Security officially announced the release of Kali Linux 2023.2 on 30th May 2023. It’s a known factor that Offensive Security always tries to bring new tools and software updates in its new releases. This release is no exception. Offensive Security brought several updates in its new Kali Linux 2023.2. We created this post to make it easy for our securitymaster readers to know more about what is new in Kali Linux 2023.2, why you should upgrade Kali Linux to 2023.2, and finally, how to upgrade Kali Linux to 2023.2 from an older release. Let’s see the answers one by one without further delay. What is Kali Linux? Why Choose Kali Linux? Kali Linux is an…
Read More
Exploring the GPT-3 Playground- A Beginner’s Guide

Exploring the GPT-3 Playground- A Beginner’s Guide

AI & Automation, Application/Appliance, Best Reads, Cloud & OS Platforms, Futuristic Technologies, Tutorials
We are living in a fast-pacing era where new technologies make our life easier. The growth in the last decade has been significant and widespread, affecting almost every aspect of our lives. We are familiar with Chat GPT, which generates responses for any input, and GLTR, which detects automatic and manually generated text from our previous articles. In this article, we will discuss another great feature developed by OpenAI. We will talk about what is a GPT-3 Playground. Exploring the GPT-3 Playground console, Key features of GPT-3 Playground, and Limitations of the GPT-3 Playground. Introduction to OpenAI Open AI is a non-profit organization that does research to develop artificial intelligence to benefit the whole of humanity. It was founded in December 2015 by Elon Musk, Sam Altman, Greg Brockman, and Ilya Sutskever. They…
Read More