Mukashi malware: What it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction Learning from the past can be an important part of future success in any endeavor, including cyberattacks. Attack groups observe this concept and apply it when they create new attack... Go on to the site to read the full article ... Read More

Kwampirs malware: what it is, how it works and how to prevent it | Malware spotlight

| | Malware Analysis
Introduction Supply chain compromise has become more of a concern as of late, with the appearance of COVID-19 affecting many industries — especially healthcare. Attack groups are taking advantage of... Go on to the site to read the full article ... Read More

How To Use Microsoft Edge Security Features

Introduction Microsoft Edge (Edge) is a web browser that was first released with Windows 10 back in 2015. Edge has essentially replaced Internet Explorer, as IE 11 is technically still around in... Go on to the site to read the full article ... Read More

How to use BitLocker in Windows 10 (with or without TPM)

Introduction Possibly the most profound security enhancement that has become the norm for organizations in recent years is encryption. Early concepts of encryption were born in the forges of war and... Go on to the site to read the full article ... Read More

Encrypted File System (EFS) in Windows 10

Introduction Everybody is talking about information security these days because it literally impacts anyone who uses (relatively) modern electronic devices. Of the many ideas to bolster information... Go on to the site to read the full article ... Read More

Share Permissions in Windows 10

Introduction Sharing files and folders is both a basic and essential task performed by nearly all organizations on a daily basis. It allows organization employees to share organization resources... Go on to the site to read the full article ... Read More

Federated Learning

| | Federated Learning
Introduction Privacy used to be so common (in the 1990s and early 2000s) that you literally could not escape it. Interactive advances in technology, social media not being the least of them, has... Go on to the site to read the full article ... Read More

Spam Filtering

| | Spam Filtering
Introduction Anyone who has had email is well familiar with the often sloppy, bungling menace that is spam. You know that that Nigerian prince that keeps telling you he found money with your name on... Go on to the site to read the full article ... Read More

Overview of phishing techniques: Compromised account

| | Phishing
Introduction One phishing technique that has gotten a significant amount of mileage in recent years is known as the compromised account technique. This technique relies on the behavior of a user... Go on to the site to read the full article ... Read More

How To Audit Windows 10 Application Logs

Introduction The Audit feature in Windows 10 is a useful carryover from prior Windows versions. It allows Windows 10 users and administrators to view security events in an audit log for the purpose... Go on to the site to read the full article ... Read More