Personnel recruitment
Luggage for security peopleWhich type of Network Security Operation and Monitoring Center is suitable for the Banking – Finance sector?
The Security Operations Center – SOC – assumes the role of detecting and handling attacks in the fastest way to reduce risks to the enterprise’s information technology system. Especially for Banking and Finance units, which are the top targets of hackers. Depending on the size of the IT system, and human resources, which models of…
Which type of Network Security Operation and Monitoring Center is suitable for the Banking – Finance sector?
The Security Operations Center – SOC – assumes the role of detecting and handling attacks in the fastest way to reduce risks to the enterprise’s information technology system. Especially for Banking and Finance units, which are the top targets of hackers. Depending on the size of the IT system, and human resources, which models of…
Cloud Data Security – Not the responsibility of any individual
On May 13th, The Vietnamese Security Network Joint Stock Company (VSEC), in collaboration with CIO Vietnam community and Noventiq, organized a sharing and practical session on solving cybersecurity incidents in the Azure cloud computing platform. The event was attended by representatives from the Department of Information Security, Ministry of Information and Communications, who shared about…
$4,000 salary is not difficult if you have these 5 important cybersecurity certifications
Up to now, cybersecurity has been globally recognized as a “hot” major in the field of information technology and has attracted a lot of attention from youngsters as well as domestic and international corporations. Besides, the salary of a cybersecurity staff can rise up to tens of thousands of dollars. Having certified can contribute to…
TOP 10 RANSOMWARE ATTACKS IN 2017
2017 was the year that everyone became aware of ransomware due to its direct effects. Along with a series of widespread attacks such as WannaCry and NotPetya, they have attracted a lot of attention for mixed reasons and become a serious threat to organizations and businesses. Let’s take a look at the deadliest attacks this…
Security on Cloud
Moving to the Cloud, businesses need a new approach to security
According to experts, the Cloud environment changes rapidly every day and it is difficult for businesses and organizations to keep up, thus requiring units to have a completely new approach to information security. In order to achieve high efficiency in work as well as achieve development goals and bring products to the market as quickly…
“SOC is the solution” on Cloud environment
On November 25, 2022, The Vietnamese Security Network (VSEC) attended the Workshop “Data safety and security in the Cloud environment” organized by VNG Cloud in Hanoi. The conference took place in two main parts: Part 1 was the topic “The security level of data on Cloud infrastructure” shared by speaker Bui Trung Thanh – Security…
Cloud Data Security – Not the responsibility of any individual
On May 13th, The Vietnamese Security Network Joint Stock Company (VSEC), in collaboration with CIO Vietnam community and Noventiq, organized a sharing and practical session on solving cybersecurity incidents in the Azure cloud computing platform. The event was attended by representatives from the Department of Information Security, Ministry of Information and Communications, who shared about…
Security for Newbie
Investigate the cause of a cyber attack through log files
This time, I received a request to analyze log files to find the cause of an attack on a company’s website using WordPress. Website was attacked by hackers and data was deleted. Below is an image of “one corner” of the log file. In this investigation, I used SublimeText 3 and Google :v Initially, I…
[Shodan] – Search engines serve security, or the evil eye?
Shodan ( https://www.shodan.io/ ) is a search engine designed by web developer John Matherly ( http://twitter.com/achillean ). Shodan is a much different search engine than content search engines like Google, Yahoo, or Bing. Shodan is a search engine to find online devices on the internet such as: computers, servers, webcams, routers… It works by scanning all devices on the…
Cyber security & frequently asked questions
Cyber security is one of the important issues for units operating on digital platforms. In this article, VSEC will provide you with frequently asked questions when you are new to the field of Information Security. 1. Why do hackers hack? – Cyber security is the activity of protecting computers, servers, mobile devices, electronic systems, networks,…
For pentester
Redteam Confession
VSEC officially launched Deep Penetration Testing Service
On April 18, Vietnam Cyber Security Joint Stock Company VSEC launched the Red Team Deep Penetration Testing service – a security assessment based on performing attacks by any means to penetrate the business’s system. career as a cybercriminal. As defined by the Computer Security Resource Center, NIST: Red Team is a group authorized and organized…
Distinguishing Between Pentest and Red Team
In the area of security, the terms Pentest and Red Team are often used interchangeably. So, what is the distinction between these two terms? We’ll discuss in this article to assist you learn more about which service would be the greatest fit for your organization. Penetration Testing: Pentester is someone who has hacker-like abilities and…
Cyber world trending
What to do when attacked by Ransomware? (1)
February 2024 is said to be a month of complete chaos in cyberspace when there are consecutive ransomware attacks. Economic losses from cyber attacks and data loss reach billions of dollars. Even large businesses that are supposed to invest in information security are confused Ransomware is appearing every day, every hour According to statistics, 2023…
Digital social management and implementing instruction for Decree 53
Digital Society Management and Decree 53, which guide the implementation of a number of Cybersecurity Law articles Decree 53/2022/ND-CP guiding the implementation of a number of articles of the Law on Cybersecurity will take effect on October 1. With the technology development, especially the connection technology infrastructure in the globalized world, these are the necessary…
Network scam tatics to be cautions about
In the final months of the year, consumers in Vietnam and around the world tend to shop more when the commodity market shows signs of stabilization and when Christmas and the Lunar New Year are approaching. This is a golden time for shopping, as well as the month of December in which hackers and scammers…
Event
Webinar: Hack hackers with “multi-dimensional” defense tactics
On July 11, 2023, the webinar “Hack hackers with “multi-dimensional” defense tactics organized by The Vietnamese Security Network (VSEC) in collaboration with Vietnam Internet Association (VIA), took place successfully and leaving many good impressions in the IT community and small and medium enterprises in Vietnam. With useful sharing from experienced speakers in the industry, the…
Practical exercise for the largest energy corporation in Vietnam
Leading energy corporation in Vietnam, operating in key national sectors, ensuring energy security for Vietnam As a large Corporation with many member units, there is a difference in qualifications in the field of information security between units. It is necessary to comply with the regulations of the State management agencies on ensuring information security for…
State Bank of Vietnam has begun deploying information security drills.
The State Bank of Vietnam is an agency of the Vietnamese government that is responsible for managing the country’s currency and reports directly to the government. The Department of Information Technology – SBV is the government agency in Vietnam responsible for overseeing and administering banking IT operations in general and information security in particular. …
Case study
15 critical security flaws in the well-known US healthcare website were found by VSEC.
Errors were discovered while applying VSEC’s Pentest service to a well-known American healthcare website, resulting in the discovery of 4 critical vulnerabilities, 3 serious breaches, and 8 possible flaws. Experts from VSEC quickly addressed all of these issues in the following two weeks, allowing businesses to move forward without worry…. Last June, VSEC received a…
Conducting a penetration test on the system of a TOP 1000 world bank
Our clients are those who operate in the banking sector. In line with the trend, they are actively developing online software utilities to provide more convenient services for current clients as well as expand their new client network. These utilities is often accompanied by security risks. VSEC’s VCHECK penetration testing service visually demonstrates the significant…
Penetration testing project for government agencies
This time, our customer is the state management agency in charge of information security, responsible for establishing regulations and policies of information security. This is also the unit in charge of assisting government agencies and businesses with information security. Although it is a State agency, the team of information security specialists is relatively small, It…