
Cyber Security
Threat Specific Prevention Tools
SERVICE: Brutespray
SKILL LEVEL: Advanced
OWNER: Open Source
DESCRIPTION:
Brutespray is a port scanning and automated brute-force python script that operates on a Kali Linux OS. The tool utilizes Nmap Scanner outputs to brute-force services with default credentials, which can be used to mitigate adversarial brute-force attacks if cracked default credentials are remediated.
LINK: GitHub - x90skysn3k/brutespray
SERVICE: Microsoft SecCon Framework
SKILL LEVEL: Advanced
OWNER: Microsoft
DESCRIPTION:
This framework is designed to help prioritize endpoint hardening recommendations.
LINK: https://github.com/microsoft/SecCon-Framework
SERVICE: Microsoft Threat Modeling Tool
SKILL LEVEL: Advanced
OWNER: Microsoft
DESCRIPTION:
This tool is designed to make threat modeling easier for developers through a standard notation for visualizing system components, data flows, and security boundaries.
LINK: https://www.microsoft.com/en-us/securityengineering/sdl/threatmodeling
SERVICE: Google Backup & Sync
SKILL LEVEL: Basic
OWNER: Google
DESCRIPTION:
This tool backs up files on Windows or Mac computers. Note: it does not allow users to restore their system; it only saves copies of files.
LINK: https://support.google.com/drive/answer/7638428
SERVICE: Windows Auto-Backup
SKILL LEVEL: Basic
OWNER: Microsoft
DESCRIPTION:
This tool sets up automatic backups of Windows 10 and 11 operating systems.
LINK: https://support.microsoft.com/en-us/windows/backup-and-restore-in-windows-352091d2-bb9d-3ea3-ed18-52ef2b88cbef
Cyber Security Cafe
Cyber Security Cafe is a private public service and offers no goods or services other than posting the current cyber threats we are facing and what we can do to prevent us from being affected and if we are, what we can do to correct the problems and to avoid intrusions in the future.
- Prevention often means not accepting the 'easy' ways.
- Most of Modern Technology exists in order to obtain your personal data.
Current Threats
Current Treats so you the latest and often most dangerous cyber threats. They indicate where they orininated from, and what areas they are targeting. By knowing in advance you can take precautionary actions now, before it's too late.
Cyber Solutions
Are a group of tools and information that is designed to keep you up to date and to give you the tools to protect both your network and equipment. Most of the tools are available 'free of charge' too and are provided by safe governmental agencies.