InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 36 min 6 sek zpět

What Is Secure Coding?

15 Červenec, 2020 - 20:16

A Lack Of Security Training Contributes To Growing Vulnerability Numbers The number of vulnerabilities that exist in production software is growing rapidly. In 2019 alone, over 22,000 new vulnerabilities were discovered and publicly reported. Of these vulnerabilities, over a third have a proof of concept or exploit code available. This means that every day in […]

The post What Is Secure Coding? appeared first on Infosec Resources.

What Is Secure Coding? was first posted on July 15, 2020 at 1:16 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SCADA & security of critical infrastructures [updated 2020]

15 Červenec, 2020 - 16:20

Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and critical infrastructure. Successful cyberattacks could paralyze internal processes, cause financial losses and potentially lead to the loss of human lives.  Many organizations in critical infrastructure have deployed SCADA/ICS to automate […]

The post SCADA & security of critical infrastructures [updated 2020] appeared first on Infosec Resources.

SCADA & security of critical infrastructures [updated 2020] was first posted on July 15, 2020 at 9:20 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 8 cybersecurity books for incident responders in 2020

15 Červenec, 2020 - 15:03

Introduction Are you passionate about incident response? Do you want to build upon your knowledge of how to mitigate cyberthreats? If yes, then you’d love the nuggets of wisdom these cybersecurity books can offer!  Although pursuing certifications like CISSP is the best way to progress in this field, gaining firsthand knowledge from other cybersecurity experts […]

The post Top 8 cybersecurity books for incident responders in 2020 appeared first on Infosec Resources.

Top 8 cybersecurity books for incident responders in 2020 was first posted on July 15, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Spamdexing (SEO spam malware)

15 Červenec, 2020 - 15:00

Introduction: About SEO spam — is my website a target? You’ve spent time and energy in positioning your website high in search engine rankings through good SEO practices. You realize, however, that someone has hijacked your site by inserting their own spam. You are a victim of SEO spam, otherwise known as spamdexing, web spam, […]

The post Spamdexing (SEO spam malware) appeared first on Infosec Resources.

Spamdexing (SEO spam malware) was first posted on July 15, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Critical security concerns for the education industry

14 Červenec, 2020 - 15:03

Balancing cybersecurity & compliance requirements in a resource-limited industry Executive summary The education industry has become a top hacker target: birth certificates, Social Security numbers, medical records, financial data, biometrics and even intellectual property give cybercriminals ample motivation to access educational databases and sell this data on the black market. Aside from the typical security […]

The post Critical security concerns for the education industry appeared first on Infosec Resources.

Critical security concerns for the education industry was first posted on July 14, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

CySA+: Studying for the exam [Updated 2020]

14 Červenec, 2020 - 15:00

Introduction: The merits of being certified as a cybersecurity analyst Many organizations are placing a greater value on hiring employees who have IT security certifications, illustrating the increasing demand for professionals with advanced skills to fill cybersecurity roles. In particular, employees often need to prove their ability in detecting and preventing vulnerabilities and in analyzing […]

The post CySA+: Studying for the exam [Updated 2020] appeared first on Infosec Resources.

CySA+: Studying for the exam [Updated 2020] was first posted on July 14, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

14 best open-source web application vulnerability scanners [updated for 2020]

13 Červenec, 2020 - 15:07

Learn Vulnerability Scanning Learn about vulnerability scanning tools. This skills course covers ⇒ Application and container scans ⇒ Analyzing vulnerability scans ⇒ Vulnerability scanning LEARN MORE Introduction In the past, many popular websites have been hacked. Hackers are active and always trying to hack websites and leak data. This is why security testing of web applications […]

The post 14 best open-source web application vulnerability scanners [updated for 2020] appeared first on Infosec Resources.

14 best open-source web application vulnerability scanners [updated for 2020] was first posted on July 13, 2020 at 8:07 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

DMV 1: VulnHub Capture the Flag (CTF) walkthrough

13 Červenec, 2020 - 15:05

In this article, we will find an answer to a Capture the Flag (CTF) challenge published on VulnHub by the author Jonathan. As per the information given by the author, the difficulty level of this CTF is easy and there are two flag files that are needed to be read to complete the CTF. One […]

The post DMV 1: VulnHub Capture the Flag (CTF) walkthrough appeared first on Infosec Resources.

DMV 1: VulnHub Capture the Flag (CTF) walkthrough was first posted on July 13, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to identify and prevent firmware vulnerabilities

13 Červenec, 2020 - 15:00

Introduction As creators of computer software begin to take security vulnerabilities more seriously, hackers are increasingly targeting the lower ends of the computer stack in hopes of stealing identities, privileges, and systems. One easy target? Firmware.  Companies are not taking firmware security as seriously as they should, especially when it comes to the UEFI or […]

The post How to identify and prevent firmware vulnerabilities appeared first on Infosec Resources.

How to identify and prevent firmware vulnerabilities was first posted on July 13, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Key findings from Infosec’s 2020 IT & security talent pipeline study

13 Červenec, 2020 - 14:00

Fewer challenges facing our industry are more pervasive than the cybersecurity talent shortage. It’s an advanced persistent threat of the human variety that impacts nearly every component of an organization’s security strategy. Not enough talent to fill open roles means security vulnerabilities and risks may go unaddressed, while also tasking existing staff with burdensome workloads. […]

The post Key findings from Infosec’s 2020 IT & security talent pipeline study appeared first on Infosec Resources.

Key findings from Infosec’s 2020 IT & security talent pipeline study was first posted on July 13, 2020 at 7:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Lessons learned from the Fresenius ransomware cyberattack

9 Červenec, 2020 - 15:02

Introduction to the Snake ransomware Fresenius is a German company that provides various health care services, including services for dialysis of people with chronic kidney failure. In the United States, it has about 40% of the market share for dialysis. The company has about 300,000 employees in more than 100 countries. Forbes Global 2000 ranks […]

The post Lessons learned from the Fresenius ransomware cyberattack appeared first on Infosec Resources.

Lessons learned from the Fresenius ransomware cyberattack was first posted on July 9, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Podcast recap: Identifying worms, bots, fraud and other malicious traffic (with guest Fang Yu)

9 Červenec, 2020 - 15:00

Introduction Fang Yu is CTO of fraud detection platform DataVisor. She is also a prolific writer and conference presenter and has filed over 20 patents. Fang spoke with Infosec‘s Cyber Work podcast about her work developing algorithms and building systems for identifying malicious traffic such as worms, spam, bots, fake queries and account hijacking. Fang […]

The post Podcast recap: Identifying worms, bots, fraud and other malicious traffic (with guest Fang Yu) appeared first on Infosec Resources.

Podcast recap: Identifying worms, bots, fraud and other malicious traffic (with guest Fang Yu) was first posted on July 9, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Best Tools to Perform Steganography [Updated 2020]

8 Červenec, 2020 - 15:05

Learn about Steganography Explore how cryptographic hashing, stenography and other techniques are used to hide data. This skills course covers ⇒ Steganography ⇒ Cryptographic hashes ⇒ And more Start your free trial In the past few years, the term “steganography” has attracted the attention of law enforcement agencies. This technique has been used by hackers […]

The post Best Tools to Perform Steganography [Updated 2020] appeared first on Infosec Resources.

Best Tools to Perform Steganography [Updated 2020] was first posted on July 8, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

7 NICE Cybersecurity Workforce Framework categories: Everything you need to know

8 Červenec, 2020 - 15:02

Introduction In the world of cybersecurity, there are many roles to play. While those roles can vary, there is also the NICE (National Initiative for Cybersecurity Education) Cybersecurity Workforce Framework to tie them together. This framework includes seven categories that describe cybersecurity work and workers. You can apply the NICE Framework to any sector — […]

The post 7 NICE Cybersecurity Workforce Framework categories: Everything you need to know appeared first on Infosec Resources.

7 NICE Cybersecurity Workforce Framework categories: Everything you need to know was first posted on July 8, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to prevent burnout in a cybersecurity career

8 Červenec, 2020 - 15:00

Introduction: Picture, if you will …  It was just another Wednesday. As usual, Grace Adams had arrived punctually at 8:00, even though she had worked late yet again last night. Her mind wandered as she went for her second venti espresso. Her life was falling apart and she could not understand it. A couple years […]

The post How to prevent burnout in a cybersecurity career appeared first on Infosec Resources.

How to prevent burnout in a cybersecurity career was first posted on July 8, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 9 free security training tools

7 Červenec, 2020 - 17:20

Cybersecurity training is one of the best defenses against cyber attacks targeting organizations and individuals alike. Although security training is a tried-and-true defense against cyber attacks and data breaches, security training is not one-size-fits all. Every organization faces unique threats based on their industry, cybersecurity tools and security policies and protocols. Every individual employee is […]

The post Top 9 free security training tools appeared first on Infosec Resources.

Top 9 free security training tools was first posted on July 7, 2020 at 10:20 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Security risks of outdated encryption: Is your data really secure?

7 Červenec, 2020 - 15:02

Introduction They say that those who fail to learn history are doomed to repeat it. A salient factor in the defeat of Austria by Prussia in the 1866 Austro-Prussian war was the Prussian army’s standardization of the (then) modern, rapid firing, bolt-action Dreyse needle-gun. In contrast, the Austrian army persisted with the use of outdated […]

The post Security risks of outdated encryption: Is your data really secure? appeared first on Infosec Resources.

Security risks of outdated encryption: Is your data really secure? was first posted on July 7, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cookies: An overview of associated privacy and security risks

7 Červenec, 2020 - 15:00

Introduction Anyone who regularly browses the internet must have seen some sort of pop-up or other form of alert about the use of cookies. Some sites even give you the option to accept cookies completely or only partially. So, there is an important question to answer: is it safe to enable cookies? In truth, the […]

The post Cookies: An overview of associated privacy and security risks appeared first on Infosec Resources.

Cookies: An overview of associated privacy and security risks was first posted on July 7, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

4 tips for phishing field employees [Updated 2020]

6 Červenec, 2020 - 15:56

Phishing is easy. Let’s just get that out of the way. It’s easy for an attacker, and, if you have the right tools (such as InfoSec Institute’s PhishSim), it is easy for a cybersecurity professional who wants to test the company employees using simulated phishing campaigns. With an average of 90 messages being delivered to […]

The post 4 tips for phishing field employees [Updated 2020] appeared first on Infosec Resources.

4 tips for phishing field employees [Updated 2020] was first posted on July 6, 2020 at 8:56 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

djinn 1: CTF walkthrough, part 1

6 Červenec, 2020 - 15:02

Introduction In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named “0xmzfr.” As per the description given by the author, this is an intermediate-level CTF. The target of this CTF is to capture two flags, which are present in user.txt and root.txt […]

The post djinn 1: CTF walkthrough, part 1 appeared first on Infosec Resources.

djinn 1: CTF walkthrough, part 1 was first posted on July 6, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security