InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 46 min 1 sek zpět

The rise of insider cybersecurity threats | Cyber Work Podcast

2 hodiny 47 min zpět

Irena Mroz, VP and Co-founder of Nucleus Cyber, and Cyber Work podcast host Chris Sienko discuss all things internal threats, from intentional and malicious attacks to poor employee practices and awareness. – View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast – Election security training: https://www.infosecinstitute.com/iq/election-security-training/ – Join us in the fight against cybercrime: https://www.infosecinstitute.com About the Cyber Work […]

The post The rise of insider cybersecurity threats | Cyber Work Podcast appeared first on Infosec Resources.

The rise of insider cybersecurity threats | Cyber Work Podcast was first posted on January 27, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Disk content wipe

23 Leden, 2020 - 15:01

Introduction Classic moves, no matter what the subject matter is, are timeless. Be it the hook shot in basketball, the uppercut in boxing or the pirouette in ballet, these are moves that you remember for the subject matter.  Believe it or not, hacker attack techniques are no different. Aside from the outright theft of information, […]

The post MITRE ATT&CK: Disk content wipe appeared first on Infosec Resources.

MITRE ATT&CK: Disk content wipe was first posted on January 23, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Nodersok

23 Leden, 2020 - 15:00

Introduction The zombie movie film genre has long been a favorite among horror film fanatics, as shown by the ever-growing number of films that portray an undead apocalypse. Each of these zombie franchises features a different way of causing zombification.  As life sometimes imitates art, this concept extends to the world of malware. An emerging […]

The post Malware spotlight: Nodersok appeared first on Infosec Resources.

Malware spotlight: Nodersok was first posted on January 23, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The user experience of security

22 Leden, 2020 - 15:01

Introduction Back in the 1990s, when you mentioned cybersecurity to anyone, a glazed look would come over their face. And fair enough. Security, as a discipline of IT, was a bit dry and boring.  Then the internet hit, and we all become co-opted into cybercrime in one form or another. Scams are now so ubiquitous […]

The post The user experience of security appeared first on Infosec Resources.

The user experience of security was first posted on January 22, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Disk structure wipe

22 Leden, 2020 - 15:00

Introduction  Denying the availability of systems and resources of an attack target is a main objective of many real-world attack campaigns. If you were going to disrupt a target, this denial of availability is probably the only part of the attack that will affect the day-to-day activity of a target endpoint’s user.  Since integrity and […]

The post MITRE ATT&CK: Disk structure wipe appeared first on Infosec Resources.

MITRE ATT&CK: Disk structure wipe was first posted on January 22, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Benefits of teaching employees to hack

21 Leden, 2020 - 15:01

Introduction You know that look in an employee’s eye when you announce the call to cybersecurity awareness training. They already work in IT or know a lot about computing. They also let you know they already know all about security. The complaints continue. The thought of sitting through some boring classroom sessions with other employees, […]

The post Benefits of teaching employees to hack appeared first on Infosec Resources.

Benefits of teaching employees to hack was first posted on January 21, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Wabbit

21 Leden, 2020 - 15:00

Introduction Beginnings are often steeped in myth, legend and a good helping of storytelling, with malware being no exception to this rule. Way back in 1974, before many of our readers were born, malware was still in its infancy, with early pioneers inventing different types of malware to simply explore what could be done.  One […]

The post Malware spotlight: Wabbit appeared first on Infosec Resources.

Malware spotlight: Wabbit was first posted on January 21, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

NIST CSF core functions: Detect

20 Leden, 2020 - 15:01

Introduction The National Institute of Standards and Technology’s Cybersecurity Framework, or NIST CSF, was first published in 2014 to provide guidance for organizational cybersecurity defenses and risk management. This framework is renowned for its inherent flexibility and open-endedness to account for different organizational needs.  At its center, NIST CSF is comprised of five core functions. […]

The post NIST CSF core functions: Detect appeared first on Infosec Resources.

NIST CSF core functions: Detect was first posted on January 20, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Supply chain compromise

20 Leden, 2020 - 15:00

Introduction Attackers are well known to install malicious software, or malware, onto compromised systems during a cyberattack. But what many may not know is that this is not the first opportunity attackers may have to sneak malware onto a machine. The supply chain that provides systems for organizations is also at risk of attack.  This […]

The post MITRE ATT&CK: Supply chain compromise appeared first on Infosec Resources.

MITRE ATT&CK: Supply chain compromise was first posted on January 20, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast

20 Leden, 2020 - 09:00

Mari Galloway, CEO of Women’s Society of Cyberjutsu, and Cyber Work podcast host Chris Sienko discuss Mari’s career journey, the ethos of Women’s Society of Cyberjutsu, and insights on how to diversify the cybersecurity workforce. – View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast – Election security training: https://www.infosecinstitute.com/iq/election-security-training/ – Join us in the fight […]

The post How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast appeared first on Infosec Resources.

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast was first posted on January 20, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cyber Work: How to become a Chief Information Security Officer

16 Leden, 2020 - 15:01

Introduction  In this episode of Infosec’s cybersecurity podcast series Cyber Work, host Chris Sienko talks with Joshua Knight, cybersecurity business leader at Dimension Data, about how to become a Chief Information Security Officer (CISO). Joshua has more than thirty years of experience in the technology space, including National Security Agency (NSA) and enterprise experience. Prepare […]

The post Cyber Work: How to become a Chief Information Security Officer appeared first on Infosec Resources.

Cyber Work: How to become a Chief Information Security Officer was first posted on January 16, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Shortcut modification

16 Leden, 2020 - 15:00

Introduction Most people love shortcuts — they make things faster and easier. This common passion is behind a lot of the conveniences we experience on a daily basis. Shortcuts have impacted modern computers as well, with the Windows shortcut being an aspect that is widely used by many. Attackers also prefer the use of shortcuts […]

The post MITRE ATT&CK: Shortcut modification appeared first on Infosec Resources.

MITRE ATT&CK: Shortcut modification was first posted on January 16, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Network Traffic Analysis for IR: UDP with Wireshark

15 Leden, 2020 - 21:31

Introduction to UDP The User Datagram Protocol (UDP) is one of the two main protocols that sits between the Internet Protocol (IP) layer and higher-level, specialized protocols like the hypertext transfer protocol (HTTP) and domain name system (DNS). The other such protocol, Transport Control Protocol (TCP), is designed to provide reliable connections with built-in error […]

The post Network Traffic Analysis for IR: UDP with Wireshark appeared first on Infosec Resources.

Network Traffic Analysis for IR: UDP with Wireshark was first posted on January 15, 2020 at 2:31 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: External remote service

15 Leden, 2020 - 15:00

Introduction If you would have told the average person fifty years ago that in the future people would be able to view what you are doing on a personal computer screen in your home or at your office, they would have thought that you were being silly at the least and crazy at the worst. […]

The post MITRE ATT&CK: External remote service appeared first on Infosec Resources.

MITRE ATT&CK: External remote service was first posted on January 15, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware Obfuscation, Encoding and Encryption

14 Leden, 2020 - 17:36

Introduction Malware is complex and meant to confuse. Many computer users think malware is just another word for “virus” when a virus is actually a type of malware. And in addition to viruses, malware includes all sorts of malicious and unwanted code, including spyware, adware, Trojans and worms. Malware has been known to shut down […]

The post Malware Obfuscation, Encoding and Encryption appeared first on Infosec Resources.

Malware Obfuscation, Encoding and Encryption was first posted on January 14, 2020 at 10:36 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Network Traffic Analysis for IR: TCP Protocol with Wireshark

14 Leden, 2020 - 17:00

Introduction to TCP The Transmission Control Protocol (TCP) is one of the most commonly-used protocols on the internet. Unlike the User Datagram Protocol (UDP), TCP is not a “fire and forget” protocol. TCP tracks the packets that are sent, confirms that they are received and retransmits copies if necessary. As a result, TCP is ideally […]

The post Network Traffic Analysis for IR: TCP Protocol with Wireshark appeared first on Infosec Resources.

Network Traffic Analysis for IR: TCP Protocol with Wireshark was first posted on January 14, 2020 at 10:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 9 Phishing Simulators [Updated 2020]

14 Leden, 2020 - 15:12

The title of this article was supposed to be “Top 10 Free Phishing Simulators”. However, after much searching, trying, visiting of broken links, filling out forms and signing up for mailing lists, it became clear that the combination of “free” and “top” really narrows down the selection to very few actual choices for phishing training. […]

The post Top 9 Phishing Simulators [Updated 2020] appeared first on Infosec Resources.

Top 9 Phishing Simulators [Updated 2020] was first posted on January 14, 2020 at 8:12 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Ethical Hacking: How to hack a web server

14 Leden, 2020 - 15:01

When practicing ethical hacking, a hacker is searching for vulnerabilities. An ethical hacker has several reasons to try gaining unauthorized control of a web server, though the primary reason is to test a server and its software for vulnerabilities. By using the same tools and methods that malicious attackers rely on, you can attempt to […]

The post Ethical Hacking: How to hack a web server appeared first on Infosec Resources.

Ethical Hacking: How to hack a web server was first posted on January 14, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Response to IT industry trends analysis 2020

13 Leden, 2020 - 15:01

Introduction The Computing Technology Industry Association (CompTIA) has just published its Industry Trends Analysis 2020. This publication takes a generalized look at the landscape in which IT professionals, including security professionals, find themselves involved in the coming year. This year’s analysis begins with these words: “There are tremendous benefits available through technology for both business […]

The post Response to IT industry trends analysis 2020 appeared first on Infosec Resources.

Response to IT industry trends analysis 2020 was first posted on January 13, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark

13 Leden, 2020 - 15:00

Introduction to the Internet Protocol The Internet Protocol (IP) is the most widely-used network-level protocol. Common transport-level protocols, the Transport Control Protocol (TCP) and the User Datagram Protocol (UDP), are encapsulated within IP packets. The purpose of IP is to make networks like the internet possible. Within a subnet, it is possible to route traffic […]

The post Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark appeared first on Infosec Resources.

Network Traffic Analysis for Incident Response: Internet Protocol with Wireshark was first posted on January 13, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security