Network security March 22, 2021 Kurt Ellzey Secure Network Protocols For a very long time, having devices just work on a network was a feat in itself. This meant that the protocols involved didn't necessarily need to be secure,...
Capture the flag (CTF) March 22, 2021 LetsPen Test CEWLKID: 1 VulnHub CTF walkthrough, part 1 Information shared in this article is intended for educational purposes only. Infosec and the author are not responsible for nefarious actions associated with...
Network security March 22, 2021 Kurt Ellzey Network Security (101) When we're building a network, the first time it comes online can always be a rush- seeing systems be detected, being able to make their way to your test sites...
Malware analysis March 18, 2021 Pedro Tavares Fileless Windows Error Reporting (WER) malware attack: Technical overview and walkthrough In October 2020, a newly uncovered malware named Kraken was observed in the wild. This malicious piece of malware is abusing the Windows Error Reporting service...
General security March 18, 2021 Srinivas How to run containers securely Hardening the Dockerfiles and securing the build environment are the first steps in protecting containers. Once the containers are started, they need different...
General security March 18, 2021 Srinivas Increaseing security by hardening the CI/CD build infrastructure CI/CD pipelines are made up of various different components such as application code, source code repositories, image repositories, build servers, containers,...
Threat Intelligence March 18, 2021 Greg Belding ATP group MontysThree uses MT3 toolset in industrial cyberespionage Targeted malware is often an issue for officials such as diplomats and telecom operators. In rare cases, industries become a target, which is known as industrial...
General security March 18, 2021 Srinivas The pros and cons of public vs internal container image repositories Docker registry is a key component in IT environments that use containers. Small businesses and individuals can rely on publicly available registry services...
Professional development March 18, 2021 Jeff Peters Which CompTIA cert is right for you: PenTest+, CySA+ or CASP+? [updated 2021] The worldwide cybersecurity workforce needs to grow by 89% to effectively defend organizations’ critical assets. That’s more than 500,000 new jobs in North...
News March 17, 2021 Sam Fay Cybersecurity Weekly: Exchange malware, Trickbot surges, new Nim malware Hackers are targeting Microsoft Exchange servers with ransomware. TrickBot takes over after cops kneecap Emotet. Researchers spotted malware written in Nim programming language. All this, and more, in this week’s edition of Cybersecurity Weekly....