Malware spotlight: Nemty

| | Malware Analysis
Introduction If the last five years or so have proven anything, it is that ransomware is here to stay as a threat in the cybersecurity wild. This should not be used as rationale to simply ignore the... Go on to the site to read the full article ... Read More

Cyber Work podcast: Election security issues for 2020

| | Cyber Work Podcast
Introduction In this episode of Infosec’s Cyber Work Podcast series, host Chris Sienko spoke with Adam Darrah about foreign vote tampering and other election security concerns for the upcoming 2020... Go on to the site to read the full article ... Read More

Malware spotlight: Ekans

| | Malware Analysis
Introduction Industrial Control Systems, or ICS, have been the target of malware for some time now. Most of these threats target Windows systems and Windows processes, and aside from targeting... Go on to the site to read the full article ... Read More

Information security manager certifications

Introduction For many organizations, the role of information security (IS) manager is both pivotal and strategically important. Among their many responsibilities are managing an organization’s... Go on to the site to read the full article ... Read More

Cyber Work podcast: Email attack trend predictions for 2020

| | Cyber Work Podcast
Introduction In this episode of Infosec’s Cyber Work podcast series, host Chris Sienko chats with Evan Reiser, CEO of Abnormal Security. They discuss where email attacks are headed in 2020, as well... Go on to the site to read the full article ... Read More

Virtualization-based sandbox malware

| | Malware Analysis
Introduction Sandboxing is well known for its ability to execute code safely without potential malicious effects afflicting a system. They are normally used when testing out how programs and... Go on to the site to read the full article ... Read More

MITRE ATT&CK: System shutdown/reboot

| | MITRE ATT&CK
Introduction When system features are used against the system itself, attackers have a unique opportunity to use the in-built capabilities of a computer to make it do what they want. Everyone knows... Go on to the site to read the full article ... Read More

Cyber Work: How to become an APT hunter with Carbon Black

| | Cyber Work Podcast
Introduction In this episode of Infosec’s cybersecurity podcast series Cyber Work, host Chris Sienko talks with David Balcar, security strategist at Carbon Black. They discuss a wide range of topics,... Go on to the site to read the full article ... Read More

Domain vs Workgroup accounts in Windows 10

Introduction Computers have been categorized by a variety of user accounts for years, with Windows systems being no exception. Having different types of accounts makes computer management easier for... Go on to the site to read the full article ... Read More

Phishing techniques: Clone phishing

| | Phishing
Introduction Trust is an important part of any relationship and once it has been established, you can generally ignore any kind of vetting you have to do for the person. When you trust someone,... Go on to the site to read the full article ... Read More