Nmap Mindmap Reference

Nmap Mindmap Reference


Leave a Comment

Python Cheat Sheets

Beginner’s Python Cheat Sheet



Python Crash Course – Cheat Sheets


Leave a Comment

These are the top ten security vulnerabilities most exploited by hackers | ZDNet

But one simple thing could help stop the vast majority of these attacks, say researchers.

Source: These are the top ten security vulnerabilities most exploited by hackers | ZDNet


Leave a Comment

Risk Management Framework for Information Systems

Risk Management Framework for Information Systems and Organizations:
A System Life Cycle Approach for Security and Privacy
NIST 800-37r2


Leave a Comment

Firefox Send’s free encrypted file transfers are now available to all

Source: Firefox Send’s free encrypted file transfers are now available to all


Leave a Comment

Chinese hacking group backdoors products from three Asian gaming companies | ZDNet

ESET suspects that tens or hundreds of thousands of users have been infected already.

Source: Chinese hacking group backdoors products from three Asian gaming companies | ZDNet

Cyber Security Espionage Titles


Leave a Comment

How to Print Comments Only in Word

When collaborating on a document with several people, leaving comments is an essential part of the process. You can print the document along with comments, but what if you want you print just the comments? You can do that.

Source: How to Print Comments Only in Word

  • InfoSec Cheat Sheets

  • Leave a Comment

    Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7

    Hot on the heels of disclosing a critical zero-day vulnerability in Chrome that was being exploited in the wild by attackers, Google has now uncovered another critical zero-day that is being used alongside it to take over Windows machines.

    Source: Google Says Upgrade To Windows 10 After Critical Flaws Found In Chrome And Windows 7


    Leave a Comment

    How to choose the right cybersecurity framework

    Does your organization need NIST, CSC, ISO, or FAIR frameworks? Here’s how to start making sense of security frameworks.

    Source: How to choose the right cybersecurity framework


    Leave a Comment

    Firefox to add Tor Browser anti-fingerprinting technique called letterboxing | ZDNet

    Firefox gets another new feature from the Tor Uplift project started in 2016.

    Source: Firefox to add Tor Browser anti-fingerprinting technique called letterboxing | ZDNet


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Comcast security nightmare: default ‘0000’ PIN on everybody’s account

    It didn’t require an account PIN to switch carriers. Everybody uses 0000, it said, making it easier for customers… and phone hijackers.

    Source: Comcast security nightmare: default ‘0000’ PIN on everybody’s account

  • Best Practice Information Security
  • Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Probably the best-selling ISO27001 Toolkit in the world

    IT Governance Ltd, the world’s one-stop shop for ISO27001 information, books, toolkits, training and consultancy for ISO27001 Information Security Management, has now sold 1,034 copies of its ISO27001 ISMS Documentation Toolkit.

    “We estimate that between 5% and 10% of all ISO27001-certified organisations worldwide have drawn on the comprehensive, best practice templates contained in our ISO27001 Toolkit,” commented Alan Calder, CEO of IT Governance.

  • The ISO27001 Documentation Toolkit
  • ISO 27001 Implementation

  • Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions | Threatpost

    The workforce and skills gap in cybersecurity continues to plague organizations.

    Source: RSAC 2019: 58% of Orgs Have Unfilled Cyber Positions | Threatpost

  • InfoSec Jobs
  • InfoSec Certs
  • Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    ISO27002 2013 ISMS Controls Gap Analysis Tool (Download)

    ISO27002: 2013 compliant! This tool has a very specific, high-level purpose in any ISMS project, which is to quickly and clearly identify the controls and control areas in which an organization does not conform to the requirements of the standard.

    Use this self-assessment tool to quickly and clearly identify the extent to which your organization has implemented the controls and addressed the control objectives in ISO 27002.

    Special offer: Get two gap analysis tools for the price of one!

    Complete your gap analysis with the ISO 27002:2013 ISMS Controls Gap Analysis Tool.

    Buy the ISO 27001:2013 ISMS Gap Analysis Tool and get this tool for free!

    Use the following code at the checkout when you buy the ISO 27001:2013 ISMS Gap Analysis Tool and the ISO 27002:2013 ISMS Controls Gap Analysis Tool will automatically be added to your shopping cart: B1G1GAP*


    Leave a Comment

    Hacking with BeEf – Stealing Social Media Credentials

    BeEF [Browser Exploitation Framework] is a penetration testing tool which focuses strongly on the web browsers. BeEF passes the hardened network perimeters.

    Source: Hacking with BeEf – Stealing Social Media Credentials


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Cyber Defense Magazine – March 2019 has arrived. Enjoy it!

    Cyber Defense Magazine October 2018 Edition has arrived. MARCH 2019 EDITION (RSA CONFERENCE PRINT EDITION & E-MAG COMING NEXT WEEK)

    Source: Cyber Defense Magazine – March 2019 has arrived. Enjoy it!


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    How to set up a VPN

    Make sure you can surf safely

      Source: How to set up a VPN

  • NordVPN apps for iOS and macOS
  •  

    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*

    RV110W, RV130W, RV215W need patching to close remote hijacking bug

    Source: Did you hear the one about Cisco routers using strcpy insecurely for login authentication? Makes you go AAAAA-AAAAAAArrg *segfault*


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    What is a botnet? And why they aren’t going away anytime soon

    A botnet is a collection of any type of internet-connected device that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large volumes of spam, steal credentials at scale, or spy on people and organizations.

    Source: What is a botnet? And why they aren’t going away anytime soon


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Cisco WebEx Meetings affected by a new elevation of privilege flaw

    A vulnerability in the update service of the Cisco Webex Meetings Desktop App for Windows could allow elevation of privilege

    Source: Cisco WebEx Meetings affected by a new elevation of privilege flaw


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment