Capture the flag (CTF) January 14, 2021 Security Ninja Hack the Box (HTB) machine walkthrough series: Vault Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named...
NICE Framework January 14, 2021 Ian Palmer Close Your Skills Gap: Putting the NICE Workforce Framework for Cybersecurity to Work If you’re looking for a blueprint that classifies, manages and explains cybersecurity work, the National Initiative for Cybersecurity Education (NICE) has...
Threat hunting January 14, 2021 Beth Osborne FBI releases Rana Intelligence Computing indicators of compromise (IOCs) The FBI’s Cyber Division recently disclosed that Iran’s intelligence agency is employing nation-state actors and a front company, Rana Intelligence Computing,...
Professional development January 13, 2021 Cyber Pop-Up Flip the funnel: Fixing the cybersecurity talent pipeline challenge Organizations of all sizes are dealing with a critical challenge: the demand for cybersecurity talent continues to grossly outpace the supply of available and...
Cyber ranges January 13, 2021 Patrick Mallory What types of attack scenarios can you simulate in a cyber range? Just as in any other endeavor, practice makes perfect, and the same goes for preparing for cyberattacks. For organizations looking to take their preparations...
Malware analysis January 13, 2021 Pedro Tavares RegretLocker ransomware: What it is, how it works and how to prevent it | Malware spotlight In October 2020, a new piece of data encryption malware made the headlines. RegretLocker is novel ransomware that can bypass the long encryption times required...
Digital forensics January 12, 2021 Srinivas Network Forensics Tools Various tools are available for Network forensics to investigate network attacks. In this article, we will discuss tools that are available for free. First,...
Digital forensics January 12, 2021 Srinivas The need for Network Forensics Most medium to large sized organizations use some sort of security monitoring in their enterprise environments. Security monitoring includes several components...
Digital forensics January 12, 2021 Srinivas Network Forensics Concepts This article outlines various Network Forensics Concepts that can come handy for beginners. We will begin by understanding what various network security threats...
General security January 12, 2021 Patrick Mallory Analysts predict CEOs will be personally liable for security incidents. Should they be? As more of our world becomes interconnected and reliant on computer systems to function, the risks from cyberattacks have increased. From public utilities,...