MALWARE Understanding the Black Basta Ransomware Service Learn how Black Basta’s double extortion tactics works.
CYBERSEC Getting Started with WiFi Security Testing Learn the steps on how to get started with WiFi security testing using Kali Linux and a NIC.
CYBERSEC The Pig Butchers Pig Butchering is when scammers fatten up a pig before sending it off for slaughter. But the scammers aren't fattening a pig, they're fattening their pockets.
CYBERSEC Cryptocurrency & Blockchain Technology Regulations The asset class has yet to be declared by the regulators and this is where the currency vs security debate begins.
INFOSEC What You Overlook In Malware Analysis When infosec people hear "malware analysis" most jump directly to binary analysis and reverse engineering.
CYBERSEC Power Grid Vulnerabilities Smart grid technology presents an opportunity for threat actors seeking to disrupt the power grid.
CYBERSEC Meet the Ransomware Gang Behind The Biggest Supply Chain Hacks A gang nicknamed Cl0p, FIN11, and TA505 has been hacking and extorting hundreds of companies for years.
CYBERSEC Why You Should Invest In Cybersecurity Startups A cybersecurity startup founder explains why you should invest in cybersecurity startups.
CYBERSEC Start Your Pentest In The Right Way To increase your chances of success and keep yourself out of trouble, hosting a kickoff meeting before starting a pen test is essential.
INFOSEC DeTy: A Website For The Missing People Of Ukraine De Ty? Де Ти? Where Are You? Volunteers from the infosec space built a website for the missing people of Ukraine.
CYBERSEC Featured Advice for Ukrainians Cyber warfare is not to be taken lightly especially for the Ukrainians! A good samaritan security researcher gives valuable advice to the Ukranian people on how they can stay safe on the internet!
INFOSEC Four-Step Intelligence Model for Decision Making Mars Groves explains the four steps of the OODA Loop model used in intelligence for decision-making, which is very useful for difficult and time-sensitive situations.
CYBERSEC Passwords: Are Words Better Than Random Letters? These good password strategies can enhance your bad password security habits.
CYBERSEC DevOps: The CAMS Model In this article, we will ignore the Sec in DevSecOps and focus on DevOps.
CYBERSEC Don't Forget About Spooling! How does spooling serve as a gateway for hackers to breach your cybersecurity, and how do you fix the vulnerabilities?
TECHNICAL Blue Team Detection: nJRat Cybersecurity engineer Charlie Crane on detecting malware by its behaviors which are relatively persistent and common across many malware flavors.
TECHNICAL Attack Defense: Windows Basic Exploitation #8 Part 8 of our popular attack/defense series on basic windows exploitation.
CYBERSEC How To Sell The Value of Cybersecurity Products It's important to understand how to sell the value of cybersecurity products and technologies to a stakeholder.
CYBERSEC Using Many Email Addresses to Reduce Your Cybersecurity Risk Using different email addresses as a cybersecurity strategy can reduce our risk. But make sure to follow good security hygiene.
CYBERSEC Guide: Why The Biggest Threat To Your Security & Privacy Is You This article is for anyone who may have an active interest in protecting their digital life as well as their physical one.
CYBERSEC A Guide to PIPEDA Compliance for Canadian Businesses The Personal Information Protection and Electronic Document Act is a regulatory requirement that applies to Canadian private sector organizations.
CYBERSEC A Closer Look at China's (First Draft) Personal Data Protection Law A closer look at the first draft of China's PDPL (Personal Data Protection Law).
CYBERSEC Cyberattack Next Steps Getting hacked can be a scary time for a business, many people don’t know what to do or even where to begin.
CYBERSEC What Is Ethical Hacking? What is ethical hacking and how can it help your business? In this article we take a closer look at ethical hacking and the work of white hat hackers.
CYBERSEC Security Tips for the Software Development Lifecycle The software development life cycle is used to design and test software products, but each step has the possibility to introduce security risks.