InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 35 min 9 sek zpět

Malware spotlight: EvilGnome

28 Leden, 2020 - 15:02

Introduction The name EvilGnome may conjure images of a malicious creature of folklore. Instead, this name actually refers to an emerging type of malware recently detected by malware researchers. This article will detail the EvilGnome malware family. We’ll explore what EvilGnome is, how EvilGnome works, malware anatomy (including modules) and probable connections to an existing […]

The post Malware spotlight: EvilGnome appeared first on Infosec Resources.

Malware spotlight: EvilGnome was first posted on January 28, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Wireshark for Incident Response 101

28 Leden, 2020 - 15:01

Introduction to Wireshark Wireshark is a freely available tool for network traffic analysis. It can be used to either analyze saved packet capture files or perform live traffic capture of packets flowing over the network, including support for promiscuous traffic capture. While Wireshark is useful for its ability to capture network traffic, its traffic dissection […]

The post Wireshark for Incident Response 101 appeared first on Infosec Resources.

Wireshark for Incident Response 101 was first posted on January 28, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

What’s new in ethical hacking: Latest careers, skills and certifications

27 Leden, 2020 - 20:41

Put on your white hat and learn how to hack for the good guys! Ethical hackers use the same techniques used by cybercriminals to assess an organization’s vulnerabilities and help keep them safe. Join Keatron Evans, Infosec instructor and Managing Partner at KM Cyber Security, on March 17 at 11:00 a.m. Central for a discussion […]

The post What’s new in ethical hacking: Latest careers, skills and certifications appeared first on Infosec Resources.

What’s new in ethical hacking: Latest careers, skills and certifications was first posted on January 27, 2020 at 1:41 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Look out for these phishy tax scams

27 Leden, 2020 - 15:01

Introduction Intrepid scammers have decided that tax season would be too boring without the looming suspense of identity theft. Joking aside, tax scams are a major problem. During the 2016 tax season alone, the IRS reported a jaw-dropping 400% spike in phishing scams, and that number has only crept up in the years since. Protecting […]

The post Look out for these phishy tax scams appeared first on Infosec Resources.

Look out for these phishy tax scams was first posted on January 27, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Juice jackers

27 Leden, 2020 - 15:00

Introduction “Juice jacker” is a term for any number of malware and malware families that infect unsuspecting mobile devices plugged into public USB charge ports — you know, the ones that are sprinkled throughout most major airports and public venues. This type of malware provides a good illustration of how risk is at the heart […]

The post Malware spotlight: Juice jackers appeared first on Infosec Resources.

Malware spotlight: Juice jackers was first posted on January 27, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The rise of insider cybersecurity threats | Cyber Work Podcast

27 Leden, 2020 - 09:00

Irena Mroz, VP and Co-founder of Nucleus Cyber, and Cyber Work podcast host Chris Sienko discuss all things internal threats, from intentional and malicious attacks to poor employee practices and awareness. – View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast – Election security training: https://www.infosecinstitute.com/iq/election-security-training/ – Join us in the fight against cybercrime: https://www.infosecinstitute.com About the Cyber Work […]

The post The rise of insider cybersecurity threats | Cyber Work Podcast appeared first on Infosec Resources.

The rise of insider cybersecurity threats | Cyber Work Podcast was first posted on January 27, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Disk content wipe

23 Leden, 2020 - 15:01

Introduction Classic moves, no matter what the subject matter is, are timeless. Be it the hook shot in basketball, the uppercut in boxing or the pirouette in ballet, these are moves that you remember for the subject matter.  Believe it or not, hacker attack techniques are no different. Aside from the outright theft of information, […]

The post MITRE ATT&CK: Disk content wipe appeared first on Infosec Resources.

MITRE ATT&CK: Disk content wipe was first posted on January 23, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Nodersok

23 Leden, 2020 - 15:00

Introduction The zombie movie film genre has long been a favorite among horror film fanatics, as shown by the ever-growing number of films that portray an undead apocalypse. Each of these zombie franchises features a different way of causing zombification.  As life sometimes imitates art, this concept extends to the world of malware. An emerging […]

The post Malware spotlight: Nodersok appeared first on Infosec Resources.

Malware spotlight: Nodersok was first posted on January 23, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The user experience of security

22 Leden, 2020 - 15:01

Introduction Back in the 1990s, when you mentioned cybersecurity to anyone, a glazed look would come over their face. And fair enough. Security, as a discipline of IT, was a bit dry and boring.  Then the internet hit, and we all become co-opted into cybercrime in one form or another. Scams are now so ubiquitous […]

The post The user experience of security appeared first on Infosec Resources.

The user experience of security was first posted on January 22, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Disk structure wipe

22 Leden, 2020 - 15:00

Introduction  Denying the availability of systems and resources of an attack target is a main objective of many real-world attack campaigns. If you were going to disrupt a target, this denial of availability is probably the only part of the attack that will affect the day-to-day activity of a target endpoint’s user.  Since integrity and […]

The post MITRE ATT&CK: Disk structure wipe appeared first on Infosec Resources.

MITRE ATT&CK: Disk structure wipe was first posted on January 22, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Benefits of teaching employees to hack

21 Leden, 2020 - 15:01

Introduction You know that look in an employee’s eye when you announce the call to cybersecurity awareness training. They already work in IT or know a lot about computing. They also let you know they already know all about security. The complaints continue. The thought of sitting through some boring classroom sessions with other employees, […]

The post Benefits of teaching employees to hack appeared first on Infosec Resources.

Benefits of teaching employees to hack was first posted on January 21, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware spotlight: Wabbit

21 Leden, 2020 - 15:00

Introduction Beginnings are often steeped in myth, legend and a good helping of storytelling, with malware being no exception to this rule. Way back in 1974, before many of our readers were born, malware was still in its infancy, with early pioneers inventing different types of malware to simply explore what could be done.  One […]

The post Malware spotlight: Wabbit appeared first on Infosec Resources.

Malware spotlight: Wabbit was first posted on January 21, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

NIST CSF core functions: Detect

20 Leden, 2020 - 15:01

Introduction The National Institute of Standards and Technology’s Cybersecurity Framework, or NIST CSF, was first published in 2014 to provide guidance for organizational cybersecurity defenses and risk management. This framework is renowned for its inherent flexibility and open-endedness to account for different organizational needs.  At its center, NIST CSF is comprised of five core functions. […]

The post NIST CSF core functions: Detect appeared first on Infosec Resources.

NIST CSF core functions: Detect was first posted on January 20, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Supply chain compromise

20 Leden, 2020 - 15:00

Introduction Attackers are well known to install malicious software, or malware, onto compromised systems during a cyberattack. But what many may not know is that this is not the first opportunity attackers may have to sneak malware onto a machine. The supply chain that provides systems for organizations is also at risk of attack.  This […]

The post MITRE ATT&CK: Supply chain compromise appeared first on Infosec Resources.

MITRE ATT&CK: Supply chain compromise was first posted on January 20, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast

20 Leden, 2020 - 09:00

Mari Galloway, CEO of Women’s Society of Cyberjutsu, and Cyber Work podcast host Chris Sienko discuss Mari’s career journey, the ethos of Women’s Society of Cyberjutsu, and insights on how to diversify the cybersecurity workforce. – View the transcript, additional episodes and promotional offers: https://www.infosecinstitute.com/podcast – Election security training: https://www.infosecinstitute.com/iq/election-security-training/ – Join us in the fight […]

The post How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast appeared first on Infosec Resources.

How Women’s Society of Cyberjutsu is diversifying security | Cyber Work Podcast was first posted on January 20, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Cyber Work: How to become a Chief Information Security Officer

16 Leden, 2020 - 15:01

Introduction  In this episode of Infosec’s cybersecurity podcast series Cyber Work, host Chris Sienko talks with Joshua Knight, cybersecurity business leader at Dimension Data, about how to become a Chief Information Security Officer (CISO). Joshua has more than thirty years of experience in the technology space, including National Security Agency (NSA) and enterprise experience. Prepare […]

The post Cyber Work: How to become a Chief Information Security Officer appeared first on Infosec Resources.

Cyber Work: How to become a Chief Information Security Officer was first posted on January 16, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: Shortcut modification

16 Leden, 2020 - 15:00

Introduction Most people love shortcuts — they make things faster and easier. This common passion is behind a lot of the conveniences we experience on a daily basis. Shortcuts have impacted modern computers as well, with the Windows shortcut being an aspect that is widely used by many. Attackers also prefer the use of shortcuts […]

The post MITRE ATT&CK: Shortcut modification appeared first on Infosec Resources.

MITRE ATT&CK: Shortcut modification was first posted on January 16, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Network Traffic Analysis for IR: UDP with Wireshark

15 Leden, 2020 - 21:31

Introduction to UDP The User Datagram Protocol (UDP) is one of the two main protocols that sits between the Internet Protocol (IP) layer and higher-level, specialized protocols like the hypertext transfer protocol (HTTP) and domain name system (DNS). The other such protocol, Transport Control Protocol (TCP), is designed to provide reliable connections with built-in error […]

The post Network Traffic Analysis for IR: UDP with Wireshark appeared first on Infosec Resources.

Network Traffic Analysis for IR: UDP with Wireshark was first posted on January 15, 2020 at 2:31 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

MITRE ATT&CK: External remote service

15 Leden, 2020 - 15:00

Introduction If you would have told the average person fifty years ago that in the future people would be able to view what you are doing on a personal computer screen in your home or at your office, they would have thought that you were being silly at the least and crazy at the worst. […]

The post MITRE ATT&CK: External remote service appeared first on Infosec Resources.

MITRE ATT&CK: External remote service was first posted on January 15, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Malware Obfuscation, Encoding and Encryption

14 Leden, 2020 - 17:36

Introduction Malware is complex and meant to confuse. Many computer users think malware is just another word for “virus” when a virus is actually a type of malware. And in addition to viruses, malware includes all sorts of malicious and unwanted code, including spyware, adware, Trojans and worms. Malware has been known to shut down […]

The post Malware Obfuscation, Encoding and Encryption appeared first on Infosec Resources.

Malware Obfuscation, Encoding and Encryption was first posted on January 14, 2020 at 10:36 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security