Howard Poston, Author at Security Boulevard

Proof of Work

| | proof of work
Introduction to blockchain consensus Blockchain systems are a collection of decentralized nodes that maintain a shared digital ledger. Without a centralized authority, the blockchain network needs some way to determine the “official” version of each block in the blockchain. This is the job of the blockchain’s consensus algorithm, which selects ... Read More

Inside the Lyceum/Hexane malware

| | Malware Analysis
The Lyceum/Hexane Cybercrime Group Lyceum and Hexane are two industry designations for an APT group that was discovered in August 2019 and was operating without detection for at least a year and... Go on to the site to read the full article ... Read More

Cybercrime at scale: Dissecting a dark web phishing kit

| | Phishing
Introduction to dark web phishing kits The internet is like an iceberg: there is a lot more to it than can be seen from the surface. In addition to the surface web (what can be accessed and indexed... Go on to the site to read the full article ... Read More
Lockphish phishing attack: Capturing Android PINs & iPhone passcodes over https

Lockphish phishing attack: Capturing Android PINs & iPhone passcodes over https

| | Phishing
Introduction to Lockphish Phishing attacks are a common tactic for gaining initial access to a system. If an attacker can convince their target to hand over their login credentials or install and... Go on to the site to read the full article ... Read More

Public-Key Cryptography in Blockchain

How public-key cryptography works Public-key or asymmetric cryptography is one of the two main types of encryption algorithms. Its names come from the fact that it uses two different encryption keys:... Go on to the site to read the full article ... Read More

Hash Functions in Blockchain

Introduction to hash functions Hash functions are one of the most extensively-used cryptographic algorithms in blockchain technology. They are cryptographic (but not encryption) algorithms that are... Go on to the site to read the full article ... Read More

Blockchain Structure

| | Blockchain Structure
Introduction The blockchain gets its name from its underlying structure. The blockchain is organized as a series of “blocks” that are “chained” together. Understanding blockchain security requires... Go on to the site to read the full article ... Read More

The business value of CompTIA CySA+ employee certification

| | General Security
Introduction The cybersecurity threat landscape is rapidly evolving, and cybercriminals are becoming more sophisticated. Traditional threat detection techniques that rely on signature-based threat... Go on to the site to read the full article ... Read More

10 Most Popular Password Cracking Tools [Updated 2020]

| | feature, General Security
Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to... Go on to the site to read the full article ... Read More

Zero-day Sophos XG Firewall vulnerability: An exploit guide for pentesters

| | Penetration Testing
The Sophos XG Firewall vulnerability The Sophos XG Firewall recently had a publicly-reported zero-day vulnerability. The vulnerability in question was an SQL injection vulnerability that, if... Go on to the site to read the full article ... Read More