Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
Infosec Immersive Boot Camps kickstart cybersecurity careers with tailored training in as little as 26 weeks.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
November 28, 2017
A screen locker is a malware in which the primary purpose is to lock the victim's screen by displaying a fearful message designed to invoke a high level of f
April 6, 2017
For those familiar with CTF contests, time is an important constraint that needs to be managed effectively to get as many points as possible. Most task write
March 22, 2017
In this second article on the dropper, we will resume our analysis right where we left off: the decryption of the key and data. After the decryption, two str
March 13, 2017
Avatar was first detected by ESET circulating in the wild in early 2013 [1]. However, no samples were collected for analysis until May of the same year. ESET
August 26, 2016
In the previous part, we stopped right at when the decision of which approach to use to encrypt the data, i.e. either Petya or Mischa. In this article, we wi
July 20, 2016
Introduction What makes Petya a special ransomware is that it doesn't aim to encrypt each file individually, but aims for low-level disk encryption. In this
July 12, 2016
Introduction A race condition occurs when two or multiple running threads manipulate the same resources without any synchronization mechanism regulating acce
March 4, 2016
Introduction : In this third and last part of the series on Pony Stealer, we're going to start where we left off last time: the encryption algorithm. After t
January 11, 2016
Introduction: In the second part of this analysis, we will be exploring how Pony steals data and how it sends it to the C&C server. We are equally intere
December 3, 2015
Introduction: A stealer is a type of malware that looks for passwords stored on the machine and sends them remotely (e.g. mail, HTTP) to an attacker. Most st
September 29, 2015
In code obfuscation, a virtual machine is a mechanism used to execute a different instruction set than the one used by machine that runs the program. For exa
August 30, 2013
Introduction : A key generator or a Keygen is a computer program that will generate a valid « Product Serial or Key » in order to completely register a soft