The Ten Best Compliance Podcasts

The 10 Best Compliance Podcasts You Should Listen To In 2024

| | Blog, feature
Podcasts have exploded in popularity over the past several years, and it’s not difficult to see why. A sort of natural evolution of the traditional radio show, podcasts make for perfect listening ...
Why Use Automated Compliance Solutions

Why Use Automated Compliance Solutions in 2024

| | Blog, feature
Compliance automation has never been more important as companies face frequently updated regulations and a growing cost of non-compliance.  A recent study found that the cost of non-compliance is 2.71 times higher ...
Combating Alert Fatigue with the MixMode AI Assistant

Combating Alert Fatigue with the MixMode AI Assistant

Combating alert fatigue is a huge challenge faced by SOC analysts and security companies alike. The overwhelming flood of rules-based alerts and notifications can often lead to missed critical incidents and increased ...

How to Detect PowerDrop Command & Control Malware

MixMode Sales Engineer, Josh Snow, explores a real-time threat detection use case involving The MixMode Platform and its ability to identify PowerDrop, a malicious Powershell script that has been specifically targeting the ...
Average CCNA salary 2020

Average CCNA salary 2020

| | CCNA, feature, FEATURED, networking, salary
Introduction The CCNA (Cisco Certified Network Associate) is one of the most well-known entry-level certifications within the IT industry. Holding this credential proves your ability to install,... Go on to the site ...

10 Most Popular Password Cracking Tools [Updated 2020]

| | feature, General Security
Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to... Go on ...

Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020]

| | feature, Hacking
A Denial of Service (DoS) attack is designed to cause service outages. These attacks can easily cost an organization a significant amount in damages and wasted resources, even if the attacker does ...

8 Best WordPress Security Plugins

| | feature, General Security
Over a third of websites (37%) are hosted on WordPress, making it the world’s most popular content management system (CMS). This includes everything from blogs to e-commerce sites that collect and... Go ...
PDF File Format: Basic Structure [updated 2020]

PDF File Format: Basic Structure [updated 2020]

| | Exploit Development, feature, PDF
Introduction We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in how the PDF ...

Hacking the Tor Network: Follow Up [Updated 2020]

| | feature, Hacking
Introduction In a previous post, I presented the main techniques used to hack Tor networks and de-anonymize Tor users. Law enforcement and intelligence agencies consider... Go on to the site to read ...