
Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.
Source: Sophos Virus Removal Tool
InfoSec and Compliance – With 20 years of blogging experience, DISC InfoSec blog is dedicated to providing trusted insights and practical solutions for professionals and organizations navigating the evolving cybersecurity landscape. From cutting-edge threats to compliance strategies, this blog is your reliable resource for staying informed and secure. Dive into the content, connect with the community, and elevate your InfoSec expertise!
May 15 2019

Free Virus Removal Tools to Secure Against Virus Infection, Including Conficker, Rootkits and More. Download the Free Sophos Virus Removal Tool Today.
Source: Sophos Virus Removal Tool
May 14 2019
The state’s attorney general wants to avoid a troubled rollout, à la Obamacare, when the far-reaching restrictions on user data go into effect on Jan. 1.
Source: California is bringing law and order to big data. It could change the internet in the U.S.
here’s the no paywall copy of the article… https://archive.fo/NmU9E
May 12 2019
The paradox, the USB stick eyeDisk that uses iris recognition to unlock the drive could reveal the device’s password in plain text in a simple way.
Source: Hacking the ‘Unhackable’ eyeDisk USB stick with Wireshark
May 09 2019
As the saying goes, experience is the best teacher. It’ll also make you a better and more well-rounded security pro.
Source: 7 Types of Experiences Every Security Pro Should Have
May 09 2019

Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper
Follow the numbers in blue to understand each step.
Threat actors are exploiting a Jenkins vulnerability (CVE-2018-1000861) disclosed in 2018 to deliver a cryptocurrency miner using the Kerberods dropper
Source: Hackers exploit Jenkins flaw CVE-2018-1000861 to Kerberods malware
May 07 2019
ICS-CERT is warning of several vulnerabilities in the GE Communicator software, including hardcoded credentials and privilege escalation bugs.
Source: ICS-CERT warns of several flaws in the GE Communicator software
May 06 2019
Reportedly, the unsecured SkyMed database exposed huge records having medical and personal information of US citizens online.
Source: Unsecured SkyMed Database Exposed PII Data Of 137K Individuals
ISO/IEC 27018:2014, 1st Edition: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)
May 05 2019
Belgian coder Bernard Fabrot just finished a 3.5-year computational marathon, solving a fascinating cryptopuzzle set at MIT back in 1999.
Source: Belgian programmer solves cryptographic puzzle – 15 years too soon!
May 03 2019
May 01 2019
Maor Hizkiev, CTO and co-founder, BitDam, explains how and why government organisations are lagging behind in implementing standard email security measures and what needs to be done to improve the state of security in the public sector.
Apr 29 2019
Tech support scammers are using iframes to lock web browsers and to trick people into calling their support hotlines posing as legitimate services to have their computers fixed after being presented with a “computer has been blocked” alert.
Source: Tech Support Scammers Freeze Browsers Using Iframes
The Browser Hacker’s Handbook
Apr 25 2019

DISC InfoSec cyber security training curriculum includes specialized InfoSec training and general cyber security courses for all levels.
![]() |
![]() |
|
|---|---|---|
| Penetration Testing | AWS Security | |

Apr 23 2019
Apr 23 2019
Source: Ten Must-Have CISO Skills – By Darren Death
CISO should have answers to these questions before meeting with the senior management.
Apr 21 2019

Stuxnet Malware Analysis By Amr Thabet
Apr 20 2019