European Cyber Units Dismantle InfinityBlack Hacking Group in Poland

European Cyber Units Dismantle InfinityBlack Hacking Group in Poland

InfinityBlack, a hacking group based in Poland and Switzerland, was taken down by Polish and Swiss law enforcement after the arrest of five alleged active members. InfinityBlack has a very specific operating ...
wfh

The Linux Foundation Takes on Digital Trust With ToIP Foundation

The Linux Foundation announced it will host the Trust over IP (ToIP) Foundation, an independent project to enable trustworthy exchange and verification of data between any two parties on the internet in ...
Security Boulevard
Zoom Phishing Campaign Tricks People into Revealing Login Credentials

Zoom Phishing Campaign Tricks People into Revealing Login Credentials

A new Zoom phishing campaign preys on people’s fears related to job security, tricking them into revealing credentials that criminals can abuse in a variety of ways. The practice of Zoom-bombing is ...

Emotet Malware Causes Physical Damage

Microsoft is reporting that an Emotet malware infection shut down a network by causing computers to overheat and then crash. The Emotet payload was delivered and executed on the systems of Fabrikam ...
https://www.sersanoconsulting.com/wp-content/uploads/2017/09/AdobeStock_155061463-Converted-copy.jpg

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...
https://www.nice.com/engage/blog/wp-content/uploads/2019/11/Types-of-Biometrics-Blog-682X325.jpg

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
NetworkMiner + Cerberos

Extracting Kerberos Credentials from PCAP

NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...
phishing

Spear Phishing 101: What It Is and How to Stop It

Spear phishing: It’s a term we hear a great deal when it comes to cybersecurity—or rather, lack thereof. But what is it, really? And why has it been so successful? The majority ...
Security Boulevard

Addressing Theft Threats From All Angles

The post Addressing Theft Threats From All Angles appeared first on SecureW2 ...

How To Trust Your Cybersecurity

The post How To Trust Your Cybersecurity appeared first on SecureW2 ...