Cyber Work podcast: Top soft skills and the Federal Cybersecurity Reskilling Academy
Introduction In this episode of Infosec’s Cyber Work podcast, host Chris Sienko spoke with Chris Triolo, VP of customer success for Respond Software. They discussed the Federal Cybersecurity... Go on to the site to read the full article ... Read More
Top 5 enterprise tools that have free home trials
Introduction Cybersecurity threats and attacks are coming faster and more persistently than ever, especially with the scattered nature of companies and the altered day-to-day operations of nearly... Go on to the site to read the full article ... Read More
Overview of phishing techniques: Urgent/limited supplies
Introduction The internet has made online shopping possible for all different types of suppliers and consumers. Online shopping is everywhere, whether it comes to social media-based “stores” or... Go on to the site to read the full article ... Read More
Network traffic analysis for IR: Data exfiltration
Introduction Understanding network behavior is a prerequisite for developing effective incident detection and response capabilities. ESG research has found that 87 percent of companies use Network... Go on to the site to read the full article ... Read More
Phishing technique: Message from a friend/relative
Introduction Like many other phishing scams featured on this site, friends-and-family imposter scams are common. These scams usually begin with a phone call impersonating a friend or relative, or... Go on to the site to read the full article ... Read More
Phishing technique: Message from the government
Introduction With the evolution of the internet, online services have grabbed the attention of every sector, including the government. Nowadays, online amenities are available in almost all... Go on to the site to read the full article ... Read More
Phishing technique: Message from the boss
Introduction Is it possible for you to ignore an email sent by your boss? Phishers believe that you probably would not, and this is the reason they are getting better at mimicking them. According to... Go on to the site to read the full article ... Read More
NIST CSF: Cybersecurity basics — Foundation of CSF
Introduction The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is all about the security of critical Infrastructure. NIST SP 800-30, Rev. 1 defines critical... Go on to the site to read the full article ... Read More
Network traffic analysis for IR: Analyzing IoT attacks
Introduction The Internet of Things (IoT) incorporates everything from tiny sensors and devices to huge structures like cloud computing. IoT includes the major networks types, such as vehicular,... Go on to the site to read the full article ... Read More
Network traffic analysis for IR: Analyzing DDoS attacks
Introduction Distributed Denial-of-Service (DDoS) attacks are one of the powerful cyber weapons threat actors use today. We often hear about a website being “brought down by attackers,” and in most... Go on to the site to read the full article ... Read More