Joy Livingstone

Joy Livingstone

Last seen: 17 days ago

Experienced Information Technologist with a strong foundation in cybersecurity. Skilled in HTML, PHP, Python, and managing complex IT environments, with hands-on experience in resolving hardware and software issues, as well as designing secure web solutions. Proven ability to manage network security and implement firewalls and virus protection, with exposure to Splunk SIEM and malware analysis. Adept at delivering technical support and training, and committed to leveraging cybersecurity skills to drive organizational success.

Member since May 21, 2023
 awoleyejoy@gmail.com

Google Prevented 2.28 Million Malicious Apps from Reach...

Google on Monday revealed that almost 200,000 app submissions to its Play Store ...

China-Linked 'Muddling Meerkat' Hijacks DNS to Map Inte...

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed...

Navigating the Threat Landscape: Understanding Exposure...

It comes as no surprise that today's cyber threats are orders of magnitude more ...

New R Programming Vulnerability Exposes Projects to Sup...

A security vulnerability has been discovered in the R programming language that ...

Sandbox Escape Vulnerabilities in Judge0 Expose Systems...

Multiple critical security flaws have been disclosed in the Judge0 open-source o...

Okta Warns of Unprecedented Surge in Proxy-Driven Crede...

Identity and access management (IAM) services provider Okta has warned of a spik...

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old M...

Cybersecurity researchers have discovered a targeted operation against Ukraine t...

OfflRouter Malware Evades Detection in Ukraine for Almo...

Select Ukrainian government networks have remained infected with a malware calle...

Akira Ransomware Gang Extorts $42 Million; Now Targets ...

Threat actors behind the Akira ransomware group have extorted approximately $42 ...

Hackers Target Middle East Governments with Evasive "CR...

Government entities in the Middle East have been targeted as part of a previousl...

How Attackers Can Own a Business Without Touching the E...

Attackers are increasingly making use of “networkless” attack techniques targeti...

BlackTech Targets Tech, Research, and Gov Sectors New '...

Technology, research, and government sectors in the Asia-Pacific region have bee...

Critical Update: CrushFTP Zero-Day Flaw Exploited in Ta...

Users of the CrushFTP enterprise file transfer software are being urged to updat...

Palo Alto Networks Discloses More Details on Critical P...

Palo Alto Networks has shared more details of a critical security flaw impacting...

CISA orders agencies impacted by Microsoft hack to miti...

CISA has issued a new emergency directive ordering U.S. federal agencies to addr...

Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC...

The Iranian threat actor known as MuddyWater has been attributed to a new comman...