Stuxnet Malware Analysis

Stuxnet Malware Analysis By Amr Thabet


 Subscribe in a reader

Leave a Comment

Every Linux Networking Tool

Every Linux Networking Tool – By Julia Evans

No alt text provided for this image


 Subscribe in a reader

Leave a Comment

Malware Analysis

Malware Analysis

 

 
Introduction to Malware Analysis | SANS Lenny Zeltser

 
Five Awesome Tools to perform Behavioural Analysis of Malware


 Subscribe in a reader

Leave a Comment

What CISO does for a living

What CISO does for a living by Louis Botha

It’s based on the CISO mindmap by Rafeeq Rehman, updated for 2018 and adding the less technical competencies

CISO does for living

Download of What CISO does for a living (pdf)

CISO MindMap 2018 – What Do InfoSec Professionals Really Do?

 

 

 

CISO should have answers to these questions before meeting with the senior management.

  • What are the top risks
  • Do we have inventory of critical InfoSec assets
  • What leading InfoSec standards and regulations apply to us
  • Are we conducting InfoSec risk assessment
  • Do we have risk treatment register
  • Are we testing controls, including DR/BCP plans
  • How do we measure compliance with security controls
  • Do we have data breach response plan
  • How often we conduct InfoSec awareness
  • Do we need or have enough cyber insurance
  • Is security budget appropriate to current threats
  •  Do we have visibility to critical network/systems
  • Are vendor risks part of our risk register


 Subscribe in a reader

Leave a Comment

Two-factor authentication: A cheat sheet

A password alone will not protect sensitive information from hackers–two-factor authentication is also necessary. Here’s what security pros and users need to know about two-factor authentication.

Source: Two-factor authentication: A cheat sheet



 Subscribe in a reader

Leave a Comment

Google’s location history data shared routinely with police

Law enforcement officials in the US have been routinely mining Google’s location history data for criminal investigations.

Source: Google’s location history data shared routinely with police

 Subscribe in a reader

Leave a Comment

Hackers could read non-corporate Outlook.com, Hotmail for six months

Hackers and Microsoft seem to disagree on key details of the hack.

Source: Hackers could read non-corporate Outlook.com, Hotmail for six months

Enter your email address:

Delivered by FeedBurner

 Subscribe in a reader

Leave a Comment

Internet Explorer flaw leaves Windows users vulnerable to hackers — even those who don’t use the browser

A zero-day exploit found in Internet Explorer means hackers could steal files from Windows users. What’s particularly interesting about this security flaw is that you don’t even need to…

Source: Internet Explorer flaw leaves Windows users vulnerable to hackers — even those who don’t use the browser


Enter your email address:

Delivered by FeedBurner

Leave a Comment

Insider Threat Report

Insider Threat Report – Out of sight should never be out of mind


Leave a Comment

Anatomy of a spearphishing attack

Anatomy of a spear phishing attack

No alt text provided for this image

    You may be wondering what it takes to send this type of attack. This is not trivial, and can only be done by someone trained in advanced hacking techniques. We will first take a look at the steps required to send an attack, and then we’ll look at steps to mitigate this threat. For the (simplified) attack steps we am freely borrowing from a great blog post by Brandon McCann, a well-known pentester.

  • Spear Phishing | KnowBe4

Image result for spear phishing attack


Enter your email address:

Delivered by FeedBurner

Leave a Comment

‘Dragonblood’ Flaw In WPA3 Lets Hackers Easily Grab Your Wi-Fi Passwords

In a research paper titled Dragonblood, published by security researchers Mathy Vanhoef and Eyal Ronen, it has been revealed that WPA3’s secure handshake called Simultaneous Authentication of Equals (SAE), commonly known as Dragonfly, is affected by password partitioning attacks.

Source: ‘Dragonblood’ Flaw In WPA3 Lets Hackers Easily Grab Your Wi-Fi Passwords

Artist's impression of wireless hackers in your computer.

Serious flaws leave WPA3 vulnerable to hacks that steal Wi-Fi passwords


Multiple Vulnerabilities in WPA3 Protocol


Enter your email address:

Delivered by FeedBurner

Leave a Comment

Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi

Public Wi-Fi is rife with security risks, and cybersecurity professionals aren’t taking any chances, according to a Lastline report.

Source: Half of security pros would rather walk barefoot in a public restroom than use public Wi-Fi

05 public wifi wi-fi


Enter your email address:

Delivered by FeedBurner

Leave a Comment

How to achieve cyber resilience in 7 steps

Cyber Resilience in 7 Steps

 

  • Cyber Resiliency Metrics | MITRE

  • Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    LimeRAT spreads in the wild

    Cybaze-Yoroi ZLab team spotted an interesting infection chain leveraging several techniques able to defeat traditional security defences and spread LimeRAT.

    Source: LimeRAT spreads in the wild

  • 2019 State of Malware | MalwareByte Labs

  • Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Information Security Policy Templates

    SANS offers 27 free #cybersecurity policy templates to help your organization develop and implement #infosec policies.

    Free information security policy templates courtesy of the SANS Institute, Michele D. Guel, and other information security leaders.

    Source: SANS Information Security Policy Templates


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    How to protect your business from tax fraud

    With the April 15th filing deadline around the corner, cybercriminals are counting on a rushed response to questions to infect potential victims.

    Source: How to protect your business from tax fraud


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Metasploit Cheat Sheet

    Metasploit Cheat Sheet by TerrorByte


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Linux quick reference card

    Linux quick reference card


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    Password Security

    Password Security Infographic by NCSC


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment

    How to completely and securely delete files in Windows

    To make sure a deleted file can’t be recovered, you’ll need to use a third-party shredding tool. Here’s a look at three such free programs: Eraser, File Shredder, and Freeraser.

    Source: How to completely and securely delete files in Windows


    Enter your email address:

    Delivered by FeedBurner

    Leave a Comment