PMP December 8, 2022 Daniel Brecht Your definitive guide to the CompTIA Project+ Certification Is the CompTIA Project+ certification for you? If so, read on to learn everything there is to know about Project+ and how it can uplevel your career prospects now.
MITRE ATT&CK™ December 6, 2022 Bianca Gonzalez Executing the Sandworm APT: Lab and walkthrough Learn the techniques the Sandworm APT hacking group used to compromise, pivot from and destroy a server. Then try to do it yourself.
News December 5, 2022 Dan Virgillito Trojan steals Facebook info, LastPass suffers another breach and Cuba ransomware warning Android trojan steals Facebook credentials of over 300,000 users, LastPass experiences another breach and Cuba ransomware alert. Catch all this and more in...
Cybersecurity engineer November 30, 2022 Greg Belding Cybersecurity engineer job & salary Learn about cybersecurity engineer salaries and explore factors that will help determine how much this role can earn.
MITRE ATT&CK™ November 29, 2022 Bianca Gonzalez Using persistence to maintain a foothold: Example and walkthrough Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.
News November 28, 2022 Dan Virgillito WhatsApp data leak, DraftKings accounts takeover and the evolution of Ducktail malware WhatsApp data leak puts almost 500 million users at risk; cybercriminals drain DraftKings breach and Ducktail malware. Catch all this and more.
Industry insights November 28, 2022 Drew Robb One phishing attack could expose your entire hospitality network What's missing from your hospitality training? Regular cybersecurity training, and it's putting your organization's reputation on the line.
Professional development November 23, 2022 Christine McKenzie Betta Lyon Delsordo, Infosec scholarship 2022 winner, is a true life-long learner A journey that begins in Montana with self-taught coding, Betta Lyon Delsordo is a 2022 Infosec Accelerate Scholarship winner.
Industry insights November 22, 2022 Drew Robb Privacy compliance and security: Are you collecting too much data? With data storage so cheap, enterprises have been over-collecting consumer data. Now may be the time to re-evaluate that approach.
MITRE ATT&CK™ November 22, 2022 Bianca Gonzalez Pivoting and proxychains with MITRE ATT&CK: Example and walkthrough Learn how adversaries leverage hardware to pivot into a protected network. Then try it yourself in our cyber range.