CYBERSEC Simple Protection Against Ransomware (Ryuk) In recent weeks ransomware hysteria has been sweeping the press thanks to a fresh wave of high profile infections.
TECHNICAL Ransomware: Attack Techniques and Countermeasures Learn more about ransomware attack techniques and countermeasures with infosec author Nihad Hassan.
TECHNICAL Featured A Definitive Guide To DMARC Learn about DMARC and how it can prevent fraudulent or spoofed emails being sent from your domain. Includes full DMARC setup instructions!
CYBERSEC Security & Data Breach Fines One of the most obvious places to find evidence of increasing cybercrime are the fines levied on organizations who suffer data breaches and security incidents.
CYBERSEC The UFO/Alien Cyber Threat Nobody else is taking the threat posed by alien red teams seriously, somebody has to and we decided that this duty falls upon us here at Secjuice.
CYBERSEC Enter the Dragon: AI + Cybersecurity Artificial Intelligence in Cybersecurity foreshadows a change in the nature of the cyber attacks that we defend against.
CYBERSEC Vendors Need to Stop Fear-Mongering Less fear and better information from vendors will help potential buyers make rational, informed purchasing decisions.
CYBERSEC A Visit To SecTor 2019 This year I went to the SecTor conference in Toronto, Canada for the first time and I had a wonderful experience.
CYBERSEC Becoming Cyber Savvy It’s Cyber Awareness month, when the vendors send emails explaining how to be cyber aware flooding your way.
CYBERSEC Zero Trust Upgrade Your Web Gateway What I like most about this zero trust upgrade model is that I can isolate all the fucks I have to give about the malicious traffic passing through my web gateway.
CYBERSEC How much do we really know? Jonny B, shares his journey into hacking, where we learn about the challenges he faced, the resources that helped, some of the benefits of certifications, and the importance of Coding.
CYBERSEC Mentoring me, mentoring you Jamie Collier explores the challenges around mentoring in infosec, and how more of us should be providing guidance to all around us.
TECHNICAL Three Reasons Developers Hate Updating Programming Languages Why do Developers hate updating Programming Languages? In this article learn why, and gain insight from engineers who have a different viewpoint.
CYBERSEC Up & Coming Hackers In this article I pay homage to awesome talent and namedrop my favorite up and coming hackers of 2019. These are a few of my favorite coders and engineers.
CYBERSEC Advice On Developing a Cyber Crisis Management Plan Practical advice for developing a cybersecurity crisis management plan and a closer look at is components.
TECHNICAL Shooting Rubber Bands At Firewalls How to defend against this denial of service attack which can be used to deactivate firewalls from a number of vendors, for less than five dollars.
CYBERSEC Chinese Threat Intelligence: Part 2 In part two of this three part series on Chinese threat intelligence we learn about Chinese Nationalism and the Chinese nation state hacking scene.
CYBERSEC Secure Browsing: My Personal Journey Infosec writer Miguel A. Calles shares his journey to secure web browsing and a review on a service that helped him achieve his browsing strategy with remote browser isolation.
INFOSEC How To Choose A Virtual Private Network (VPN) Provider This article will help you cut through the VPN vendor marketing confusion and help you choose a provider who is serious about your privacy.
CYBERSEC Credential Stuffing Attacks Are Rising In Popularity, But They're Easy to Stop Why have rudimentary attacks such as credential stuffing become so common? Because hackers prefer to spend their time using more efficient and less costly attack methods.
CYBERSEC What You Don't Know Can Hurt You “What you don’t know can't hurt you” is an old saying which does not really apply to infosec.
CTF HackTheBox Giddy Write Up Join security researcher Shaksham Jaiswal on a technical deep dive into HackTheBox's Giddy CTF.
CYBERSEC NiceHash Miner Software Vulnerability There is a vulnerability in the NiceHash crypto miner software which can leak miners personal information to observers.
CYBERSEC Thunderson's Journey To The OSCP Learn about security researcher ThunderSon's journey to the OSCP and get some free bonus learning resource links!
CYBERSEC Researcher Assaulted By A Vendor After Disclosing A Vulnerability Following a serious vulnerability disclosure affecting casinos globally, an executive at Atrient has allegedly assaulted the researcher who first disclosed the vulnerability.