InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 13 min 54 sek zpět

Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight

29 Červenec, 2020 - 15:03

Introduction Netwalker is a data encryption malware that represents an evolution of the well-known Kokoklock ransomware and has been active since September 2019. This article will detail the specific technical features of the Netwalker ransomware. We will analyze what Netwalker is, how it works and how you can avoid falling victim to this threat. In […]

The post Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight appeared first on Infosec Resources.

Netwalker malware: What it is, how it works and how to prevent it | Malware spotlight was first posted on July 29, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

What is the NICE Cybersecurity Workforce Framework?

29 Červenec, 2020 - 15:02

Introduction: All about the NCWF The National Initiative for Cybersecurity Education (NICE), led by the National Institute of Standards and Technology (NIST), is a partnership between government, academia and the private sector which works to promote cybersecurity education, training and workforce development.  NICE published Special Publication 800-181 with its statutory responsibilities under the Federal Information […]

The post What is the NICE Cybersecurity Workforce Framework? appeared first on Infosec Resources.

What is the NICE Cybersecurity Workforce Framework? was first posted on July 29, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Data execution prevention (DEP) in Windows 10

29 Červenec, 2020 - 15:00

Introduction Does this sound familiar? “Sorry, not on the list.” “Oh come on! I was just in there five minutes ago! I just need to go get my coat.” “Not on the list.” “Okay.” Five minutes later: “Still not on the list.” “Oh come on, I spent like twenty bucks on this hat!” “Not. On. […]

The post Data execution prevention (DEP) in Windows 10 appeared first on Infosec Resources.

Data execution prevention (DEP) in Windows 10 was first posted on July 29, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to use Windows 10 quick recovery options

29 Červenec, 2020 - 14:49

Introduction In the days of Windows 10, everything is fine and happy and everything works all the time. OK, that may be just a tiny bit exaggerated. Like it or not, issues happen sometimes without warning and that are beyond our ability to control. Whether you experience hardware failures or software issues, the ability to […]

The post How to use Windows 10 quick recovery options appeared first on Infosec Resources.

How to use Windows 10 quick recovery options was first posted on July 29, 2020 at 7:49 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to use Disk Quotas in Windows 10

28 Červenec, 2020 - 21:52

Introduction Let’s say for a moment that it’s been a big family dinner and you’ve got one massive pie left for dessert. You ask who wants pie, and four people each say they want pie. You divide the pie equally among the four people and each person receives the same size slice.  Before you’re done […]

The post How to use Disk Quotas in Windows 10 appeared first on Infosec Resources.

How to use Disk Quotas in Windows 10 was first posted on July 28, 2020 at 2:52 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The False Claims Act and cybersecurity: Are third-party vendors putting you at risk?

28 Červenec, 2020 - 15:00

Introduction A government supplier law written over a century ago may seem outdated in the digital age, but it may be putting your company at risk. Recent court rulings related to the 1863 False Claims Act have broad ramifications for cybersecurity, and your organization needs to understand how it may be impacted. What is the […]

The post The False Claims Act and cybersecurity: Are third-party vendors putting you at risk? appeared first on Infosec Resources.

The False Claims Act and cybersecurity: Are third-party vendors putting you at risk? was first posted on July 28, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Are apps stealing company secrets? Smart device privacy concerns for businesses

28 Červenec, 2020 - 15:00

Introduction Privacy often feels like it is something that can be bought, sold and/or simply ignored. So many people use the old and worn argument: “If you have nothing to hide, why worry about privacy…”  Privacy, certainly from an individual’s standpoint, has been center stage for a few years now. Debacles such as the Facebook/Cambridge […]

The post Are apps stealing company secrets? Smart device privacy concerns for businesses appeared first on Infosec Resources.

Are apps stealing company secrets? Smart device privacy concerns for businesses was first posted on July 28, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

SQL Injection Vulnerabilities

28 Červenec, 2020 - 14:45

Databases and the structured query language A database is designed to store data in an understandable and easily accessible way. Data is organized into tables, rows and columns, making it easy to find a particular value within a database if you know where to look. The structured query language (SQL) is designed to make data […]

The post SQL Injection Vulnerabilities appeared first on Infosec Resources.

SQL Injection Vulnerabilities was first posted on July 28, 2020 at 7:45 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Data Security in Windows 10

28 Červenec, 2020 - 14:07

Introduction By design, Windows 10 is more secure than its predecessors Windows 7 and Windows 8.1. That’s what the people from Microsoft say, anyway. One excellent measuring tool regarding security is how well an OS can protect data. This article examines the subject matter in question from three perspectives: Data backup Data encryption Additional data […]

The post Data Security in Windows 10 appeared first on Infosec Resources.

Data Security in Windows 10 was first posted on July 28, 2020 at 7:07 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to use AppLocker in Windows 10

27 Červenec, 2020 - 18:28

What is AppLocker? AppLocker is an application whitelisting feature which helps an organization to control what apps and files can be run by the user. AppLocker was first introduced with Windows 7 OS, Windows Server 2008 R2. AppLocker provides a simple interface to prevent or block an application from running by unintended users. These include […]

The post How to use AppLocker in Windows 10 appeared first on Infosec Resources.

How to use AppLocker in Windows 10 was first posted on July 27, 2020 at 11:28 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

hackNos Player 1.1: CTF walkthrough

27 Červenec, 2020 - 15:05

In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named Rahul Gehlot. As per the description given by the author, this is an intermediate-level CTF. The target of this CTF is to get to the root of the machine and read the […]

The post hackNos Player 1.1: CTF walkthrough appeared first on Infosec Resources.

hackNos Player 1.1: CTF walkthrough was first posted on July 27, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Coronavirus predictions: What are the long-term workplace implications of COVID-19?

27 Červenec, 2020 - 15:00

Introduction: What will the world look like after the COVID-19 vaccine? Human societies are often challenged by events out of our control. Extreme weather events happen and take with them many businesses and lives. Small-scale epidemics cause havoc in localities and countries. But one thing that we can say for humans is that we are […]

The post Coronavirus predictions: What are the long-term workplace implications of COVID-19? appeared first on Infosec Resources.

Coronavirus predictions: What are the long-term workplace implications of COVID-19? was first posted on July 27, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Are there any new cybersecurity threats that come with 5G technology?

23 Červenec, 2020 - 15:05

Introduction  5G technology has long been a source of controversy over health and security concerns. This is particularly true because the introduction of an open, all-software defined network will require a physical and technological overhaul of essential networks and cybersecurity practices, but there are also strong incentives for adoption.  5G not only paves the way […]

The post Are there any new cybersecurity threats that come with 5G technology? appeared first on Infosec Resources.

Are there any new cybersecurity threats that come with 5G technology? was first posted on July 23, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Ramsay malware: What it is, how it works and how to prevent it | Malware spotlight

23 Červenec, 2020 - 15:00

Introduction The unique functionality of things normally makes them as much of a point of interest as an oddity. Malware is no exception to this notion and a malware framework known as Ramsay provides a great example of it.  Unlike nearly every other malware, Ramsay has the ability to jump air gaps in an organization’s […]

The post Ramsay malware: What it is, how it works and how to prevent it | Malware spotlight appeared first on Infosec Resources.

Ramsay malware: What it is, how it works and how to prevent it | Malware spotlight was first posted on July 23, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Simple Malware Obfuscation Techniques

23 Červenec, 2020 - 13:53

What is malware? Malware stands for malicious software and software, in simple language, means some program written in any programming language. So if a malicious program is intentionally written to cause damage to any computer or server or gain unauthorized access to any system, it is called malware. Malware is a generic term used to […]

The post Simple Malware Obfuscation Techniques appeared first on Infosec Resources.

Simple Malware Obfuscation Techniques was first posted on July 23, 2020 at 6:53 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization

22 Červenec, 2020 - 15:03

Introduction Dealing with the many emerging cybersecurity challenges is a daunting task. With the ever-increasing number of attacks and cybercriminals that constantly update their techniques, it is easy to fall a step behind in an unfair competition. Usually, when we talk about cybersecurity, the first thing that comes to mind is the cutting-edge technologies offered […]

The post How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization appeared first on Infosec Resources.

How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization was first posted on July 22, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

New Cisco report: SMB security posture catches up to enterprise counterparts

22 Červenec, 2020 - 15:00

Introduction Small-to-medium businesses (SMBs) have a lot of things to deal with. They have a huge number of responsibilities but not a lot of resources to do them with and even fewer people to perform them when compared to enterprises. One area in particular that wasn’t really addressed in the past is cybersecurity, because companies […]

The post New Cisco report: SMB security posture catches up to enterprise counterparts appeared first on Infosec Resources.

New Cisco report: SMB security posture catches up to enterprise counterparts was first posted on July 22, 2020 at 8:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to configure Internet Options for Local Group Policy

21 Červenec, 2020 - 19:34

Introduction Does this sound familiar? “Welcome to Monopoly!” “All right, now we’re going to go with auctions if you don’t buy.” “Why? That’s so annoying!” “Because if we don’t, it takes forever.” “All right, fine, but I want money if I land on Free Parking.” “Fine, if that’s what it takes. But I want ‘even […]

The post How to configure Internet Options for Local Group Policy appeared first on Infosec Resources.

How to configure Internet Options for Local Group Policy was first posted on July 21, 2020 at 12:34 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Credential Management Vulnerabilities

21 Červenec, 2020 - 19:13

The importance of strong credential management Passwords are the most commonly-used method by which users authenticate to online accounts, computers and other systems. The reason for the massive adoption of usernames and passwords is that they are simple to understand, operate and use. Since users understand how passwords work and find them easy to use, […]

The post Credential Management Vulnerabilities appeared first on Infosec Resources.

Credential Management Vulnerabilities was first posted on July 21, 2020 at 12:13 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Command Injection Vulnerabilities

21 Červenec, 2020 - 18:52

What is a command injection vulnerability? Many applications are not designed to be wholly self-contained. They often access external systems as well, including databases, application programming interfaces (APIs) and others. Some applications are designed to run commands within the terminal of the system that they are running on. For example, a program may wish to […]

The post Command Injection Vulnerabilities appeared first on Infosec Resources.

Command Injection Vulnerabilities was first posted on July 21, 2020 at 11:52 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security