How to verify and respond to vulnerability reports from security researchers

| | General Security
Introduction Part of doing business in today’s increasingly cyber-world is dealing with security vulnerabilities and bugs that come up along the way. Many organizations first learn about a... Go on to the site to read the full article ... Read More

AWS Essentials & Solution Architect Associate certification: The ultimate guide

| | AWS Essentials
Introduction With the rapidly evolving cloud market and the COVID-19 pandemic, many organizations are looking for ways to adapt to the new normal. One of the ways is moving their IT infrastructure to... Go on to the site to read the full article ... Read More

7 ways K-12 teachers can help close the cybersecurity skills gap

| | General Security
Introduction Security professionals have grown ubiquitous across many industries. However, the workforce is still seeing a shortage of talent that actually has the knowledge and skills to defend... Go on to the site to read the full article ... Read More

6 ways to address the OWASP top 10 vulnerabilities

| | General Security
Introduction The OWASP top 10 list of vulnerabilities has long been the source of data that information security professionals trust with making critical security decisions. There are many different... Go on to the site to read the full article ... Read More

Network Traffic Analysis for IR — Discovering RATs

| | Discovering RATs
Introduction A Remote Access Trojan (RAT) is part of the malware family. It enables covert surveillance, a backdoor channel and unfettered and unauthorized remote access to a victim’s computer. Using... Go on to the site to read the full article ... Read More
Hack the Box (HTB) machines walkthrough series — Arctic

Hack the Box (HTB) machines walkthrough series — Arctic

| | Capture the Flag
Today, we will be continuing with our exploration of Hack the Box (HTB) machines, as seen in previous articles. This walkthrough is of an HTB machine named Arctic. HTB is an excellent platform that... Go on to the site to read the full article ... Read More

Ethical hacking: IoT hacking tools

| | IoT Hacking Tools
Introduction IoT (Internet of Things) and embedded devices present a new challenge to ethical hackers hoping to understand the security vulnerabilities these devices contain. To hack IoT interfaces... Go on to the site to read the full article ... Read More

Malware spotlight: EvilGnome

| | Malware Analysis
Introduction The name EvilGnome may conjure images of a malicious creature of folklore. Instead, this name actually refers to an emerging type of malware recently detected by malware researchers.... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Disk content wipe

| | MITRE ATT&CK
Introduction Classic moves, no matter what the subject matter is, are timeless. Be it the hook shot in basketball, the uppercut in boxing or the pirouette in ballet, these are moves that you remember... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Supply chain compromise

| | MITRE ATT&CK
Introduction Attackers are well known to install malicious software, or malware, onto compromised systems during a cyberattack. But what many may not know is that this is not the first opportunity... Go on to the site to read the full article ... Read More