Skip to content
MA
Open to work

Hi, I'mMohammed AlYahya

Cybersecurity Leadership

Blog Category: News

federal departments ordered to improve logging capabilities

Federal Departments Ordered to Improve Logging Capabilities

OMB Memo Describes Steps Agencies Must Take to Report Cyber IncidentsThe White House is ordering U.S. agencies to improve their logging capabilities to better track when attackers target their networks and data. The initiative addresses

Read Post
attackers can remotely disable fortress wi fi home security alarms

Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms

New flaws allow attackers to disable Fortress Wi-Fi home security alarm system remotely   Source

Read Post
researchers propose machine learning based bluetooth authentication scheme

Researchers Propose Machine Learning-based Bluetooth Authentication Scheme

A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably. Called "Verification of Interaction Authenticity" (aka VIA), the

Read Post
cisa adds single factor authentication to the list of bad practices

CISA Adds Single-Factor Authentication to the List of Bad Practices

Securing accounts and personal information through single-factor authentication is now on the list of bad practices by CISA.   Source

Read Post
new microsoft exchange proxytoken flaw lets attackers reconfigure

New Microsoft Exchange ‘ProxyToken’ Flaw Lets Attackers Reconfigure Mailboxes

ProxyToken, a new vulnerability (CVE-2021-33766) in Microsoft Exchange allows hackers to modify server configurations and steal users' emails.   Source

Read Post