4 reasons why you should include current events in your phishing simulation program

| | Security Awareness
Introduction One of the dirtiest aspects of phishing campaigns in the wild is that they will take advantage of anything happening in the world today to make their job easier. Most notably and timely... Go on to the site to read the full article ... Read More

Podcast recap: Fuzzing, security testing and tips for a career in AppSec

| | Cyber Work Podcast
Introduction In this episode of Infosec’s Cyber Work Podcast, host Chris Sienko welcomes back previous guest Dr. Jared DeMott. In the previous episode, the topic was all things IoT security. This... Go on to the site to read the full article ... Read More

Ramsay malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction The unique functionality of things normally makes them as much of a point of interest as an oddity. Malware is no exception to this notion and a malware framework known as Ramsay... Go on to the site to read the full article ... Read More

PoetRAT malware: what it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction As new malware constantly emerges, some have been taking advantage of recent events to make it easier to establish a foothold on a targeted system and wage a cyberattack. Once such... Go on to the site to read the full article ... Read More

Top 7 must-have cybersecurity books

| | General Security
Introduction Are you in cybersecurity and are looking to expand your knowledge horizons? Are you getting your start in cybersecurity and looking for a way to immerse yourself in the field before you... Go on to the site to read the full article ... Read More

Grandoreiro malware: what it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction One of the few things that attracts the attention of malware researchers more than novel types of malware is malware that expands its attack horizon to new areas of the globe. Couple... Go on to the site to read the full article ... Read More

Microsoft certification update: MCSA & MCSE certifications retired

Introduction It may have come as a shock to you that two of the leading Microsoft certifications, Microsoft Certified Solutions Associate (MCSA) and Microsoft Certified Solutions Expert (MCSE), will... Go on to the site to read the full article ... Read More

Online certification opportunities: 4 vendors who offer online certification exams

| | General Security
Introduction With most of the workforce working from home these days due to COVID-19, you may be wondering if it is possible to earn a certification or two during this time to validate your... Go on to the site to read the full article ... Read More

Paradise malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction Meet Paradise, a malware that has been lurking in the wild since 2017. While it may not be a vacation in a tropical locale, it certainly can be a nightmare for users afflicted by it. ... Go on to the site to read the full article ... Read More

Cyber Work podcast: How to become a cyber risk specialist

Introduction In this episode of Infosec’s Cyber Work podcast, host Chris Sienko speaks with Ryan Wallace, cyber risk expert and cyber risk supervisor at HORNE Cyber. They discussed the ins and outs... Go on to the site to read the full article ... Read More