How to Disable TLS 1.0 and TLS 1.1 via Group Policy

How to Disable TLS 1.0 and TLS 1.1 via Group Policy

Application/Appliance, Cloud & OS Platforms, Cyber Security, Tutorials, Windows
We have covered how to disable TLS 1.0 and TLS 1.1 on Windows Server in the previous post. That lets you know how to disable TLS protocols on a Windows Server locally. If you try disabling deprecated TLS on all the servers one after another, it may sound like an uphill task. In such a case, it could be implemented using Active Directory’s Group Policies. We have created this post to let you know how to disable TLS 1.0 and TLS 1.1 via Group Policy. Without further due, let’s see how to disable TLS 1.0 and TLS 1.1 via Group Policy. How to Disable TLS 1.0 and TLS 1.1 via Group Policy Time needed: 15 minutes. How to Disable TLS 1.0 and TLS 1.1 via Group Policy Open regedit utilityOpen Group Policy Management (gpmc.msc) in a Domain Controller. Creating a…
Read More
The Most Useful OpenSSL Commands to Work With SSL Certificates

The Most Useful OpenSSL Commands to Work With SSL Certificates

Application Security, Application/Appliance, Best Reads, Cloud & OS Platforms, Cryptography, Cyber Security, Tutorials, Windows
OpenSSL is an open-source software library designed to secure digital communications and certificates. It is used by many websites and organizations worldwide to encrypt information in transit, such as emails, web traffic, and other data exchanged over the internet or computer networks. OpenSSL also provides a way for trusted entities to sign documents or digital certificates in order to verify the authenticity and integrity of the data. OpenSSL provides an invaluable security layer that helps to protect online transactions from malicious actors. This article provides an overview of commonly used OpenSSL commands to work with SSL certificates. It covers various operations such as generating a new certificate, checking the details of an existing certificate, converting the certificate into different format, debugging when there is an error occurs, and pretty much everything that…
Read More
The Ultimate Guide to CentOS Server Hardening- Linux Server Hardening

The Ultimate Guide to CentOS Server Hardening- Linux Server Hardening

Application/Appliance, Cloud & OS Platforms, Cyber Security, Linux, Network Security, Tutorials
Cybercrime is on the rise and is expected to maintain its rapid growth in the coming years. Some would even argue that it will soon become the number one threat to the global economy. That’s why businesses should take cybersecurity seriously and do their best to stay up to date with the latest security standards. In this article, we bring you a step-by-step guide on how to secure CentOS 8. Why Is CentOS Security Important? Linux distributions, such as CentOS, are some of the most secure operating systems available today. But that doesn’t mean you shouldn’t take the proper measures to secure them further. While private users might get away with the default CentOS settings, businesses are more likely to be targeted by cybercriminals. So if you’re a business owner, make CentOS…
Read More
How to Protect Your Apple Devices From a 0-Day Type Confusion Vulnerability in iOS, iPadOS, macOS, tvOS, and Safari Web Browser

How to Protect Your Apple Devices From a 0-Day Type Confusion Vulnerability in iOS, iPadOS, macOS, tvOS, and Safari Web Browser

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Attacks, Cyber Security, Threats & Vulnerabilities, Tutorials, Vulnerabilities
On 13th Dec, tech giant Apple rolled out security updates for their iOS, iPadOS, macOS, tvOS, and Safari web browser platforms to protect your Apple devices from a 0-day Type Confusion vulnerability iniOS, iPadOS, macOS, tvOS, and Safari web browser. According to Google’s Threat Analysis Group (TAG), the flaw lets attackers perform arbitrary code execution on vulnerable products using specially crafted content. Apple didn’t disclose the technical details about the flaws to avoid the exploitation of the vulnerabilities. Let’s explore what Apple has shared about the 0-Day Type Confusion vulnerability in this post. A Short Introduction About Webkit Browser Engine Apple has been using the Webkit browser engine for its Safari browser on Mac, iPad, and iPhone since 2003. It is an open-source project that works to provide better web standards compliance and performance in Apple’s devices. WebKit is…
Read More
The Ultimate Guide to Harden the Ubuntu Server- Linux Server Hardening

The Ultimate Guide to Harden the Ubuntu Server- Linux Server Hardening

Application Security, Application/Appliance, Best Reads, Cloud & OS Platforms, Cyber Attacks, Cyber Security, Network Security, Threats & Vulnerabilities, Tutorials
Linux distributions, such as Ubuntu, are known for their excellent architecture and extensive security features. So it’s no wonder that both developers and security experts choose Linux to keep their systems secure. While Ubuntu is well-equipped with great security features right out of the box, some initial configurations are required to make the most of it. In this post, you will learn how to harden Ubuntu 20.04. The Importance of Linux Server Hardening Linux server hardening is the process of securing a Linux server by applying the latest security standard and configurations, as well as installing the necessary software. If you apply the right security measures, you can significantly reduce the chances of your Linux server ever getting compromised. Here are some common threats that can affect Linux servers. Brute force attacks Open port exploits Outdated…
Read More
Step-by-Step Procedure to Set Up An Active Directory On Ubuntu

Step-by-Step Procedure to Set Up An Active Directory On Ubuntu

Application Security, Application/Appliance, Best Reads, Cloud & OS Platforms, Cyber Security, Linux, Tutorials
Active Directory (AD) is a technology developed by Microsoft to provide secure access and authentication for networks. It has become an essential tool in the IT industry, providing administrators with centralized control of user accounts and network resources. Since Active Directory service is developed by Microsoft, do you think Windows is the only operating system that provides Active Directory? The answer is no. Active Directory services could be built on the non-Windows platform. Ubuntu is one such open-source ono-Windows operating system built on Linux kernel that could be used to set up Active Directory service. This article will discuss how to set up an Active Directory on Ubuntu — an open-source operating system used mainly for server applications. In this guide, we will go through step-by-step instructions on installing and configuring AD on Ubuntu…
Read More
Discovering Wireshark: 7 Features to Analyze a PCAP File Using Wireshark

Discovering Wireshark: 7 Features to Analyze a PCAP File Using Wireshark

Application Security, Application/Appliance, Cloud & OS Platforms, Cyber Security, Network Security, Pen Testing, Tutorials
Every security analyst would have used or at least heard of the tool named Wireshark. In todays article, we are looking into what is Wireshark, how to download it and some features to analyze a PCAP file using Wireshark. Before going to see how to analyze a PCAP file, let’s see what is Wireshark and its key features with supported interfaces. What is Wireshark and How to Download It? Wireshark is a network analyzer that can be used to capture and analyze network traffic. It is widely used by network administrators, security professionals, and students to troubleshoot network problems, investigate security incidents, and learn about network protocols. Wireshark supports a wide variety of network protocols and is available for various platforms, including Windows, macOS, and Linux. Wireshark is available for…
Read More
12 Best Security Settings in Windows 11

12 Best Security Settings in Windows 11

Application Security, Application/Appliance, Cloud & OS Platforms, Cryptography, Cyber Security, Network Security, Tutorials, Windows
If you’re looking for the best security settings in Windows 11, you’ve come to the right place. In this article, we’ll show you how to change some of the key security settings in Windows 11 to help keep your computer safe from harm. First, let’s talk about what kinds of things can happen if your computer isn’t properly secured. If you’re connected to the internet, there are a number of potential threats out there that could cause severe damage to your system. Viruses and malware are two of the most common types of threats, and they can wreak havoc on your computer if they’re not dealt with quickly and effectively. Another significant threat to consider is phishing attacks. This is where someone tries to trick you into giving them your personal…
Read More
How to Set Up Multifactor Authentication on Your Windows 11?

How to Set Up Multifactor Authentication on Your Windows 11?

Application Security, Application/Appliance, Cloud & OS Platforms, Cryptography, Cryptography, Cyber Security, Tutorials, Windows
Multifactor authentication is an important security measure that can help protect your Windows account from being hacked. By requiring more than one form of authentication, it makes it much harder for attackers to gain access to your account. We created this post to let you know how to set up multifactor authentication on your Windows 11 using Microsoft’s Authenticatior App. There are many different ways to set up multifactor authentication on your Windows. One popular option is to use a physical token, such as a USB key, in addition to your password. Another option is to use biometric authentication, such as fingerprint or iris scanning, in the same way, you can also use Microsoft Authenticator App, a secure soft token application to generate 6 digit soft tokens. No matter which method you choose, multifactor authentication can…
Read More
How to Disable TLS 1.0 and TLS 1.1 on Your Nginx Server?

How to Disable TLS 1.0 and TLS 1.1 on Your Nginx Server?

Application Security, Application/Appliance, Cloud & OS Platforms, Cryptography, Cyber Security, INFOSEC, Linux, Tutorials
Transport Layer Security (TLS) is an important protocol that plays a vital role in helping to secure networks and protect data. TLS works by providing authentication, encryption, and integrity between two endpoints, allowing for secure communication over the internet or any other network. By using strong cryptography and digital certificates, TLS helps ensure that data sent across the network remains private and cannot be intercepted or tampered with by malicious actors. TLS 1.2 and TLS 1.3 are the two latest versions of the Transport Layer Security (TLS) protocol and offer many advantages over their previous versions. TLS 1.2 is the most widely used version of the TLS protocol, but TLS 1.3 is gaining popularity because of its efficiency and speed. As a server administrator, you should enable TLS 1.2 and TLS 1.3 on your Nginx Server…
Read More