General security February 20, 2023 Daniel Brecht Cybersecurity in Biden’s era With President's Day here, the 18th nationally appointed cybersecurity awareness month behind us, and Joe Biden's presidency at its midpoint—let’s review...
General security January 16, 2023 Bianca Gonzalez Password security: Using Active Directory password policy Learn how to implement password security policies using Active Directory in this walkthrough from Infosec Skills author Mike Meyers.
Hacking December 26, 2022 Bianca Gonzalez How to crack a password: Demo and video walkthrough Infosec Skills author Mike Meyers shows just how easy it is to use a brute-force attack or a password dictionary attack to crack a password.
Hacking December 19, 2022 Bianca Gonzalez Inside Equifax’s massive breach: Demo of the exploit The Equifax data breach affected nearly half of the U.S. population. In this episode of Cyber Work Applied, see how the attack actually happened.
Penetration testing September 20, 2022 Pedro Tavares Red Teaming: Taking advantage of Certify to attack AD networks Learn more about using Certify to attack AD networks.
Penetration testing April 29, 2022 Louis Livingston-Garcia How ethical hacking and pentesting is changing in 2022 The cloud and new web applications are changing the world of ethical hacking and penetration testing.
Application security January 12, 2023 Nitesh Malviya Introduction to DevSecOps and its evolution and statistics Learn about the growth of DevSecOps and key statistics associated with it for 2022.
Application security October 18, 2022 Gina Napier MongoDB (part 3): How to secure data Learn how to secure data in a MongoDB database.
Security awareness January 30, 2023 Bianca Gonzalez 5 ways to prevent APT ransomware attacks APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.
Security awareness January 20, 2023 Jeff Peters Celebrate Data Privacy Week: Free privacy and security awareness resources Practice data privacy year-round with these free resources for Data Privacy Week! Learn about data privacy best practices, data privacy careers and more.
Professional development March 10, 2023 Greg Belding Cybersecurity engineer: CyberSeek For many in the cybersecurity field and those considering cybersecurity as a career focus, the most coveted position is cybersecurity engineer. Cybersecurity...
Professional development March 3, 2023 Patrick Mallory Infosec Accelerate Scholarship winner highlights essential qualities of a successful cybersecurity professional Shaz Baig, an Accelerate Scholarship winner, veteran, and cybersecurity professional, shares his keys to success in the field and his goals for the future.
Malware analysis January 10, 2023 Pedro Tavares How AsyncRAT is escaping security defenses Learn more about the popular and dangerous AsyncRAT malware.
Malware analysis October 19, 2022 Pedro Tavares Chrome extensions used to steal users’ secrets Learn how Chrome extensions are being used for nefarious purposes.
Phishing March 6, 2023 Bianca Gonzalez How to set up a phishing attack with the Social-Engineer Toolkit See a live demo of a phishing attack using the Social-Engineer Toolkit and learn how cybercriminals are using AI to make them more effective.
Phishing February 27, 2023 Bianca Gonzalez Extortion: How attackers double down on threats You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand. Learn how these extortion attacks work.
Capture the flag (CTF) April 14, 2022 LetsPen Test THE PLANETS EARTH: CTF walkthrough, part 1 This is an easy-level CTF and is recommended for beginners in the field.
Capture the flag (CTF) April 11, 2022 LetsPen Test EMPIRE BREAKOUT: VulnHub CTF walkthrough Learn some crucial cybersecurity skills with this capture the flag activity.
Digital forensics July 14, 2022 Pedro Tavares Top 7 tools for intelligence-gathering purposes Experts can often collect significant artifacts related to the authors behind the analyzed scenarios during cybersecurity exercises, including details such...
Digital forensics September 7, 2021 Hashim Shaikh iOS forensics Day by day, smartphones and tablets are becoming ever more popular, and as a result, the technology used in development to add new features or improve the security...
Management, compliance & auditing January 30, 2023 John Bandler Federal privacy and cybersecurity enforcement — an overview Learn a quick overview of the federal government’s privacy and cybersecurity laws.
Management, compliance & auditing September 20, 2022 John Bandler U.S. privacy and cybersecurity laws — an overview Learn how federal and state privacy laws intersect with cybersecurity and how to comply without being overwhelmed.
News March 13, 2023 Dan Virgillito Massive AT&T data breach and fake jobs targeting security researchers AT&T data breach exposes 9 million user accounts, North Korean adversaries target security researchers with fake job offers and the IceFire ransomware....
News March 6, 2023 Dan Virgillito U.S. Marshals service breach and TPM 2.0 security flaws Hackers steal sensitive data from U.S. Marshals Service systems, TPM 2.0 security flaws could allow cybercriminals to steal cryptographic keys and the MQsTTang...
Secure coding January 17, 2023 Nitesh Malviya DevSecOps Tools of the trade Dig into the DevSecOps tools, including Source Composition Analysis and Static Analysis Security Testing, used in cybersecurity work.
Secure coding January 16, 2023 Gilad Maayan Secure software deployment for APIs Why application programming interfaces (or APIs) are an essential component of cybersecurity.
Reverse engineering July 26, 2021 Howard Poston Kali Linux: Top 8 tools for reverse engineering These Kali Linux tools are great for offensive and defensive cybersecurity.
Reverse engineering March 1, 2021 Richard Azu Stacks and Heap Memory is a crucial resource for any system when conducting reverse engineering. Malware analysts must understand the way memory is assigned to a program. During...
Network security March 13, 2023 Bianca Gonzalez How to configure a network firewall: Walkthrough Learn the basics of configuring a network firewall in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.
Network security February 6, 2023 Bianca Gonzalez 4 network utilities every security pro should know: Video walkthrough When can a certain network utility do the most good for you? Learn how and when you can use Ping, Netstat, Traceroute and ARP in this video.
Threat Intelligence August 3, 2021 Dan Virgillito Dark Web hacking tools: Phishing kits, exploits, DDoS for hire and more The demand for dark web hacking tools has reached all-time highs across the cybercriminal ecosystem during the COVID-19 pandemic.
Threat Intelligence July 29, 2021 Dan Virgillito Double extortion ransomware: Pay now or get breached Ransomware has become a lot more sophisticated recently, and learning more about it is important to stay safe in case it happens to you.
Cryptography January 23, 2023 Bianca Gonzalez How does hashing work: Examples and video walkthrough What is password hashing? Infosec Skills author Mike Meyers explains how a hash works and demonstrates common hashing use cases.
Cryptography August 18, 2022 Patrick McSweeney How does encryption work? Examples and video walkthrough Infosec Skills author Mike Meyers provides an easy-to-understand walkthrough of cryptography.
Cloud security February 20, 2023 Joe South Working across multiple cloud service providers: CSP security learning path Cloud, misconfiguration and learning to work across multiple cloud service providers as a cloud security engineer.
Cloud security February 9, 2023 Joe South Securing cloud-based applications training: What you need to know Learn about securing cloud-based applications no matter what cloud platforms you're using.
Industry insights January 17, 2023 Drew Robb Data storage security isn’t working: Here are 5 ways to improve Data storage and backup systems are far more insecure than other IT systems, research says. Here are five ways to improve their security.
Industry insights January 10, 2023 Drew Robb Protect your data with zero-trust networks 83% of former employees retain access to one or more of your company's accounts. It's past time to use a zero-trust network to ensure your data stays safe.
Operating system security September 22, 2022 Daniel Brecht Certifications compared: Linux+ vs RHCSA/RHCE [2022 update] Find out which certifications are best to validate your knowledge and skills working in open-source environments.
Operating system security June 2, 2021 Daniel Brecht Android security: Everything you need to know [Updated 2021] Android devices have a host of security risks, but updates are helping to mitigate them.
Incident response January 19, 2022 Gilad Maayan How will zero trust change the incident response process? Find out how Zero Trust security affects the incident response process.
Incident response November 26, 2021 Waqas How to build a proactive incident response plan The average cost of a data breach is now $4.24 million. A proactive incident response plan is crucial to help organizations mitigate that risk.
Vulnerabilities September 27, 2022 Pedro Tavares Digium Phones Under Attack and how web shells can be really dangerous Learn about the dangers web shells have on Digium phones.
Vulnerabilities August 30, 2022 Pedro Tavares vSingle is abusing GitHub to communicate with the C2 server Lazarus' advanced persistent threat (APT) operations use malware specially crafted for attacking financial institutions, espionage, and disruptive purposes.
Critical infrastructure October 4, 2022 Drew Robb Securing operational technology: Safeguard infrastructure from cyberattack How do we guard operational technology against cyberattacks? Tune in as Francis Cianfrocca, Insight Cyber Group CEO, & Chris Sienko dissect this very issue.
Critical infrastructure October 6, 2021 Greg Belding Operation technology sees rise in targeted remote access Trojans and ransomware Operation technology (OT) is one of the most overlooked segments of the IT sector that attack groups target.
Healthcare information security August 18, 2021 Susan Morrow Genetic testing “hottest” new form of health insurance fraud, FBI warns The FBI is finding more and more cases of health insurance fraud. Learn more about it.
Healthcare information security July 13, 2021 Susan Morrow Healthcare data security issues: Best security practices for virtual healthcare sessions With more telehealth and related digital mechanisms to deliver health, healthcare data security standards are more important than ever.
MITRE ATT&CK™ February 20, 2023 Bianca Gonzalez Advanced adversary tactics and defense evasion: Lab and walkthrough Learn how advanced persistent threat groups use defense evasion to remain undetected in this walkthrough with Keatron Evans.
MITRE ATT&CK™ February 13, 2023 Bianca Gonzalez Privilege escalation via cross-site scripting: Lab and walkthrough Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.
Threat hunting December 3, 2021 Waqas Compromise assessment or threat hunting? What do organizations need? Compromise assessment and threat hunting are two rising techniques of implementing network security. Figure out what your organization needs.
Threat hunting February 15, 2021 Dan Virgillito Deception technologies: 4 tools to help you identify threats and mitigate risks Deception technologies have come a long way from the days when honeypots were used to analyze attacker behavior. Today’s deception tools contain advanced...
Machine learning and AI February 3, 2022 Kimberly Doyle AI and machine learning career paths, trends and job prospects Learn about the job prospects for artificial intelligence and how to prepare for a career in it.
Machine learning and AI November 30, 2021 Susan Morrow Will a Digital Bill of Rights solve machine learning and privacy issues? Will the Digital Bill of Rights fix the machine learning algorithm and privacy conundrum?
IoT Security July 28, 2022 Lester Obbayi Capture: Improve IoT firmware security with new firmware architecture In this article, we shall discuss what Capture is and discuss how its application can benefit both IoT device owners and IoT device vendors.
IoT Security May 4, 2021 Susan Morrow Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi Nightmare? [updated 2021] As smart toys get more advanced, they bring more cybersecurity risk with them.
Blockchain security July 14, 2021 Susan Morrow Decentralized identifiers (DIDs) and blockchain: The silver bullet for online privacy? Learn more about decentralized identifiers and the role they play in keeping your privacy and data intact.
Blockchain security April 26, 2021 Susan Morrow Cryptocurrency Enforcement Framework: Impacts on digital forensic investigations A new Cryptocurrency Enforcement Framework was recently released. Learn how it may impact cryptocurrency, cybersecurity and digital forensics investigations.
Insider threat November 9, 2021 Kurt Ellzey Homeland Security’s Cyber Talent Management System (CTMS) Find out all you need to know about the Department of Homeland Security's Cyber Talent Management System.
Insider threat November 3, 2021 Kurt Ellzey Insider risk management: Balancing security and employee agility How to balance security when insider risk management is a concern.
NIST Cyber Security Framework November 18, 2021 Howard Poston NIST first responder guidance: Balancing mobile security with response time The NIST 1800-13 standard describes how public safety first responder organizations can improve access to sensitive data without compromising security
NIST Cyber Security Framework October 26, 2021 Susan Morrow Critical software security guidance issued by NIST Explore the five best practices in cybersecurity risk mitigation for all organizations based on NIST's Security Measures for EO-Critical Software Use.
Cyber ranges August 1, 2022 Elise Chan Infosec Skills August Challenge Join the quest for new skills, bragging rights and over $1,000 in prizes. Each month, we’ll release a brand new challenge. Can you complete it?
Cyber ranges March 22, 2021 Patrick Mallory ICS cyber ranges: Hands-on training for industrial control system security teams Incident response has been a pillar of cybersecurity for decades. But plans to account for the unique risks surrounding the specialized command and control...
DoD 8570 January 26, 2023 Beth Osborne The ultimate guide to DoD 8570 certification and compliance Everying you need to know about the Department of Defense's 8570 Directive.
DoD 8570 November 17, 2022 Greg Belding DoDD 8570 IAM level III A complete guide to DoDD 8570 IAM Level III
NICE Framework June 23, 2021 Susan Morrow Two ways to build a secure software team using the NICE Framework The NICE Framework can help you run your organization smoothly.
NICE Framework May 6, 2021 Susan Morrow Two ways to build a cybersecurity team using the NICE Framework Using the NICE Framework for Cybersecurity will help you structure your team against cyberthreats.