Red Teams

In a Social Engineering Showdown: AI Takes Red Teams to the Mat
That AI has gotten much more proficient in social engineering is a revelation that's not surprising, but still sets alarm bells ringing ...
Security Boulevard
An Olympic Size Cybersecurity Threat
The Paris Olympics will captivate global attention for several weeks this summer. As the world’s top athletes gather to showcase their skills, cybercriminals are gearing up to capture valuable digital prizes as ...

Understanding the Need for A Risk Register in Cybersecurity
Risk registers are a vital tool for cybersecurity planning that consolidate business risks into a single, manageable space. They provide streamlined reporting and information to align teams around the most important initiatives ...

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Richi Jennings | | COSMICENERGY, electric grid, electrical grid, Electrical grids, energy grid, grid cyber attack, ICS, IEC 60870-5-104, IEC-104, INCONTROLLER, Industroyer, Industroyer2, Malware, OT, power grid, Power-Grid Security, Red Team, Red team exercises, red team operations, red team testing, Red Teaming, Red Teams, red-team-tools, redteam, Russia, Russia Exodus, Russia power grid, Russia-Ukraine, russia-ukraine conflict, Russia's War on Ukraine, russian, Russian Cyber War, SB Blogwatch, Solar Polygon, triton, TRITON ICS malware, Triton malware
Shouty name—dangerous game. Red-team tool ripe for misuse ...
Security Boulevard
If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing Security Right
Jonathan Reiber | | Automated Testing, Blog, Blue Teams, CMMC, cyberdefense, Cybersecurity Maturity Model Certification, DoD, effectiveness, Red Teams, SBN News, security control validation, white teams
Complying with DoD’s new cybersecurity regulations requires hard data, the kind that pretty much requires automation to compile. The post If You Don’t Hire Robots to Attack Your Networks, You’re Not Doing ...

Why Recruiting Cybersecurity Talent Is Like Looking for a Needle in a Haystack
Harish Bhat | | Blog, Blue Teams, Cyber Skills, Cybersecurity, Red Teams, Security Operations Training (SOC)
Read Time 2 minutes Enterprises looking to beef up their cyber resilience face major challenges in on-boarding ...

Is Security Slowing Down Your DevOps Cadence?
Harish Bhat | | AppSec Training, Blog, Capture-the-Flag (CTF), Compliance, Cybersecurity, hackathons, owasp, Red Teams, Secure Coding Education, Secure Development Training
Read Time 3 minutes Enterprises that have moved to a DevOps environment face major challenges. They have multiple code bases that need to be supported and hundreds of builds ...

Unleash a Kick-Ass AppSec Ninja Program
Harish Bhat | | AppSec Training, Blog, Blue Teams, Capture-the-Flag (CTF), Cybersecurity, gamification, hackathons, PCI, Red Teams, Secure Coding Education, Secure Development Training
Read Time 2 minutes Left shifting of security has moved developers to the frontline of application security. However, developers have limited ...