Cyber Work podcast write-up: How to become a cybersecurity analyst

| | Cyber Work Podcast
Introduction This article will explore some interesting details from an episode of Infosec’s information security career podcast, Cyber Work. This episode, with guest Jonathan Butler, covers how to... Go on to the site to read the full article ... Read More

Ethical hacking: Port interrogation tools and techniques

Introduction “Know your enemy.” This is as true in hacking as it is in war, and port interrogation is a key part of that. Port interrogation is a key skill that the bad guys use frequently when they... Go on to the site to read the full article ... Read More

Malware spotlight: What is rogue security software?

| | Malware Analysis
Introduction Remember before you became security-conscious? Or maybe you always have been — either way, you most likely have been faced with this scenario. You sit down at your PC, fire it up and are... Go on to the site to read the full article ... Read More

Malware Spotlight: What is APT?

| | Malware Analysis
Introduction For some things, the whole is greater than the sum of its parts. When it comes to cybersecurity, this saying is an appropriate description of Advanced Persistent Threat (APT)... Go on to the site to read the full article ... Read More

MITRE ATT&CK vulnerability spotlight: Bash history

| | MITRE ATT&CK
Introduction MITRE is a federally funded research and development center (FFRDC) for the U.S. government. This means that they perform a variety of activities for the U.S. government. In MITRE’s... Go on to the site to read the full article ... Read More

Malware Spotlight: What are wipers?

| | Malware Analysis
Introduction Imagine showing up to work and sitting down at your computer on an average day. You turn the computer on, take a sip of coffee, and find that your system has been wiped of all... Go on to the site to read the full article ... Read More

MITRE ATT&CK vulnerability spotlight: Account manipulation

| | MITRE ATT&CK
Introduction MITRE functions as a U.S. government-funded research and development center (FFRDC). This role involves performing trusted third-party research, development and evaluation for the... Go on to the site to read the full article ... Read More

So you want to move from the help desk to the security team

| | General Security
Introduction Everybody has a start in their chosen field. Sometimes this start is a calculated, deliberate choice and sometimes it is a product of both chance and luck. When I had my start in... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Replication through removable media

| | MITRE ATT&CK
Introduction The progression of information security has been heavily focused on the internet as the primary source of threats. What may be overlooked is the specter that was around during the early... Go on to the site to read the full article ... Read More

MITRE ATT&CK: Command-line interface

| | MITRE ATT&CK
Introduction Try to remember the first time you sat at a PC. What was one of the seemingly high-level features about it that impressed you? Chances are that one of these features was the command-line... Go on to the site to read the full article ... Read More