Hacking February 9, 2021 Irfan Shakeel Nmap from Beginner to Advanced [Updated 2021] Network Mapper (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not limited to...
Microsoft Azure February 9, 2021 Kurt Ellzey Top 30 Microsoft Azure interview questions and answers Azure. Until relatively recently, this word was associated primarily with gemstones and the sky on a cloudless day. Cloudless is a little ironic, since nowadays...
CCNA February 9, 2021 Greg Belding Average Cisco Certified Cyber Ops Associate salary in 2021 There is a new certification in the Cisco certification roster: the Cisco Certified Cyber Ops Associate. This certification is intended for associate-level...
Capture the flag (CTF) February 8, 2021 Security Ninja Hack the Box (HTB) machines walkthrough series — Unbalanced Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named...
Security awareness February 8, 2021 Susan Morrow Malicious SEO campaigns: Mitigating risk with zero-trust approach The culture of the “corporate website” has become synonymous with 21st-century business. To compete and be seen in a global space, organizations need...
Threat Intelligence February 8, 2021 Dan Virgillito Top 9 cybercrime tactics, techniques and trends in 2020: A recap 2020 was a busy year for cybercriminals, with new opportunities brought on by the COVID-19 lockdowns and digital transformation initiatives. According to...
Threat Intelligence February 4, 2021 Greg Belding KashmirBlack botnet targets WordPress, Joomla and other popular CMS platforms If you are a malware researcher, you’ve probably heard of KashmirBlack, a botnet that has been in the wild since 2019. If you are not a malware researcher,...
Capture the flag (CTF) February 4, 2021 Security Ninja Hack the Box (HTB) machines walkthrough series — OpenKeyS Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named...
Malware analysis February 4, 2021 Beth Osborne CISA report: Iranian web shells (and other MARs) The Cybersecurity & Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR20-259A) regarding MAR-10297887-1.v1 – Iranian Web...
Network security February 3, 2021 Pedro Tavares Exploiting built-in network protocols for DDoS attacks A distributed denial-of-service (DDoS) attack is an attempt to make an online service unavailable to users, usually by temporarily interrupting or suspending...