So you want to move from the help desk to the security team

| | General Security
Introduction Everybody has a start in their chosen field. Sometimes this start is a calculated, deliberate choice and sometimes it is a product of both chance and luck. When I had my ...

GPEN vs. OSCP: Which one is better for a career in ethical hacking and/or pentesting?

| | General Security
Introduction: Ethical hacking and pentesting are crucial Cybercrime statistics suggest that unethical attackers have become more innovative in their ways to exploit vulnerabilities on... Go on to the site to read the ...

Malware spotlight: What are backdoors?

| | General Security
Introduction Imagine staring down an impregnable fortress or network and determining that there is no conceivable way in without obvious detection. You would probably trade half of the tools in your... Go ...

MITRE ATT&CK: Man-in-the-browser

| | General Security
Introduction Web browsing is a well-known cause of exposure to a variety of nasty pieces of malware and related maladies for web surfers. This is especially true if they are using pre-infected ...

Can your personality indicate how you’ll react to a cyberthreat?

| | General Security
Introduction All of us are as individual as snowflakes in a winter storm … or so we think. Psychologists beg to differ, and in doing so, attribute five main personality types to ...

Certifications compared: GSLC vs. CISM

| | General Security
Introduction Management is an important part of many organizations and their composite departments, including information security/technology and cybersecurity. To verify a top-flight level of... Go on to the site to read the ...

Inside the Ryuk ransomware

| | General Security
What is Ryuk? Ryuk is a ransomware sample that has been making the rounds recently. It is designed to be used in targeted attacks and has no ability to move laterally through ...

Degree vs. certification: Mid-level cybersecurity architect

| | General Security
Introduction Those looking to combine top-flight cybersecurity skills and knowledge with information security design and building principles should consider becoming a cybersecurity architect. This... Go on to the site to read the ...

The difference between Cross-Site and Server-Side Request Forgery

| | General Security
Introduction to CSRF and SSRF Cross-Site Request Forgery and Server-Side Request Forgery attacks have similar names, and both take advantage of how servers process URLs. However, these attacks have... Go on to ...

Degree vs. certification: Entry-level penetration tester

| | General Security
Introduction Have you ever wanted to use your cybersecurity know-how and skills to help organizations improve their information security and stamp out vulnerabilities? If so, the role of penetration... Go on to ...
Loading...