Emotat Malware Causes Physical Damage

Microsoft is reporting that an Emotat malware infection shut down a network by causing computers to overheat and then crash. The Emotet payload was delivered and executed on the systems of Fabrikam ...
https://www.sersanoconsulting.com/wp-content/uploads/2017/09/AdobeStock_155061463-Converted-copy.jpg

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...
This is how hackers hack you using simple social engineering

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
NetworkMiner + Cerberos

Extracting Kerberos Credentials from PCAP

NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...
industries phishing

Spear Phishing 101: What It Is and How to Stop It

Spear phishing: It’s a term we hear a great deal when it comes to cybersecurity—or rather, lack thereof. But what is it, really? And why has it been so successful? The majority ...
Security Boulevard

Addressing Theft Threats From All Angles

The post Addressing Theft Threats From All Angles appeared first on SecureW2 ...

How To Trust Your Cybersecurity

The post How To Trust Your Cybersecurity appeared first on SecureW2 ...

What’s New and Changing in the World of Vulnerability Management?

According to CIS, “Organizations that do not scan for vulnerabilities and proactively address discovered flaws face a significant likelihood of having their computer systems compromised.” While vulnerability management (VM) isn’t new, I’ve ...
Facebook strikes again – now asks new subscribers for passwords to their email accounts

Facebook strikes again – now asks new subscribers for passwords to their email accounts

Facebook just can’t get a break. After a long string of accusations directed at the social platform for security and privacy concerns, Facebook has now been caught using an appalling security practice ...
Freeze on Phishing

Winter’s Cold Won’t Put a Freeze on Phishing

2018 was the year of the phish, and phishing attacks are only growing more sophisticated Despite the bitter temperatures that January brings, fishing enthusiasts will brave the cold and traverse across the ...
Security Boulevard