Bianca Gonzalez

Bianca Gonzalez is a writer, researcher and queer Latina brain cancer survivor who specializes in inclusive B2B insights and multicultural marketing. She completed over 400 hours of community service as a college student.
Bianca Gonzalez

Connecting a malicious thumb drive: An undetectable cyberattack

Did you know cybercriminals can pull off a nearly undetectable cyberattack using only a malicious thumb drive? Learn how.

Secure cloud computing: What you need to know

APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.

How to configure a network firewall: Walkthrough

Learn the basics of configuring a network firewall in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.

How to set up a phishing attack with the Social-Engineer Toolkit

See a live demo of a phishing attack using the Social-Engineer Toolkit and learn how cybercriminals are using AI to make them more effective.

Extortion: How attackers double down on threats

You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand. Learn how these extortion attacks work.

Advanced adversary tactics and defense evasion: Lab and walkthrough

Learn how advanced persistent threat groups use defense evasion to remain undetected in this walkthrough with Keatron Evans.

Privilege escalation via cross-site scripting: Lab and walkthrough

Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.

4 network utilities every security pro should know: Video walkthrough

When can a certain network utility do the most good for you? Learn how and when you can use Ping, Netstat, Traceroute and ARP in this video.

5 ways to prevent APT ransomware attacks

APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.

How does hashing work: Examples and video walkthrough

What is password hashing? Infosec Skills author Mike Meyers explains how a hash works and demonstrates common hashing use cases.

Password security: Using Active Directory password policy

Learn how to implement password security policies using Active Directory in this walkthrough from Infosec Skills author Mike Meyers.

How Zoom is being exploited for phishing attacks

Learn how easy it is to create a Zoom phishing email in this episode of Cyber Work Applied with Infosec Principal Security Researcher Keatron Evans.