Tag: InfoSec Resources

How to get security clearance and win more contracts

Read the original article: How to get security clearance and win more contracts Introduction Having a security clearance can increase your job options and make you a more sought-after employee. An individual is not authorized to obtain a clearance on…

Security first: Compliance by design

Read the original article: Security first: Compliance by design Introduction Whether it’s the General Data Protection Regulation (GDPR) or the New York Stop Hacks and Improve Electronic Data Security Act (NY SHIELD), nearly every regulation or industry standard… Go on…

Critical security concerns facing the technology industry

Read the original article: Critical security concerns facing the technology industry Executive summary Of the top five most valuable brands in North America in 2019, four were information technology companies. Information technology has provided a backbone of innovation that is……

Top 5 enterprise tools that have free home trials

Read the original article: Top 5 enterprise tools that have free home trials Introduction Cybersecurity threats and attacks are coming faster and more persistently than ever, especially with the scattered nature of companies and the altered day-to-day operations of nearly……

How to turn your IT team into a security team

Read the original article: How to turn your IT team into a security team Introduction: IT teams vs. security teams Building a strong security team should be a priority for all organizations today. This includes companies that already have a…

Top 6 malware strains to watch out for in 2020

Read the original article: Top 6 malware strains to watch out for in 2020 Introduction: The upsurge of malware Malware is a favorite way for cybercriminals to launch attacks. A number of malware types have made the news as responsible…

Web server protection: Web server security monitoring

Read the original article: Web server protection: Web server security monitoring Introduction Web server security is important in ensuring the correct operation of your websites. It allows you to identify vulnerabilities and any other security issues found to exist within…

Overview of phishing techniques: Urgent/limited supplies

Read the original article: Overview of phishing techniques: Urgent/limited supplies Introduction The internet has made online shopping possible for all different types of suppliers and consumers. Online shopping is everywhere, whether it comes to social media-based “stores” or… Go on…

How to use BitLocker in Windows 10 (with or without TPM)

Read the original article: How to use BitLocker in Windows 10 (with or without TPM) Introduction Possibly the most profound security enhancement that has become the norm for organizations in recent years is encryption. Early concepts of encryption were born…

MITRE ATT&CK spotlight: Process injection

Read the original article: MITRE ATT&CK spotlight: Process injection Introduction It is no longer a surprise to discover that attackers have changed their attack methodologies and continue to improve the sophistication of their Tactics, Techniques and Procedures… Go on to…

How To Use Microsoft Edge Security Features

Read the original article: How To Use Microsoft Edge Security Features Introduction Microsoft Edge (Edge) is a web browser that was first released with Windows 10 back in 2015. Edge has essentially replaced Internet Explorer, as IE 11 is technically…

Spam Filtering

Read the original article: Spam Filtering Introduction Anyone who has had email is well familiar with the often sloppy, bungling menace that is spam. You know that that Nigerian prince that keeps telling you he found money with your name…

Federated Learning

Read the original article: Federated Learning Introduction Privacy used to be so common (in the 1990s and early 2000s) that you literally could not escape it. Interactive advances in technology, social media not being the least of them, has… Go…

Share Permissions in Windows 10

Read the original article: Share Permissions in Windows 10 Introduction Sharing files and folders is both a basic and essential task performed by nearly all organizations on a daily basis. It allows organization employees to share organization resources… Go on…

Encrypted File System (EFS) in Windows 10

Read the original article: Encrypted File System (EFS) in Windows 10 Introduction Everybody is talking about information security these days because it literally impacts anyone who uses (relatively) modern electronic devices. Of the many ideas to bolster information… Go on…

ICS/SCADA Social Engineering Attacks

Read the original article: ICS/SCADA Social Engineering Attacks Introduction ICS/SCADA systems are essential to the daily operations of utility companies and industrial manufacturers. Due to their importance, these vulnerable systems are targets for attack. These… Go on to the site…

Overview of phishing techniques: Compromised account

Read the original article: Overview of phishing techniques: Compromised account Introduction One phishing technique that has gotten a significant amount of mileage in recent years is known as the compromised account technique. This technique relies on the behavior of a…

Intrusion Detection and Prevention for ICS/SCADA Environments

Read the original article: Intrusion Detection and Prevention for ICS/SCADA Environments Introduction Although the target audience for this writing is information security professionals such as ICS & SCADA or automation managers and engineers, it may also be useful to other…

SIEM for ICS/SCADA Environments

Read the original article: SIEM for ICS/SCADA Environments Introduction Security Information and Event Management (SIEM) solutions are the traditional IT go-to for organizations looking to get the most out of their vast information load, which includes… Go on to the…

6 ways to address the OWASP top 10 vulnerabilities

Read the original article: 6 ways to address the OWASP top 10 vulnerabilities Introduction The OWASP top 10 list of vulnerabilities has long been the source of data that information security professionals trust with making critical security decisions. There are…

How To Audit Windows 10 Application Logs

Read the original article: How To Audit Windows 10 Application Logs Introduction The Audit feature in Windows 10 is a useful carryover from prior Windows versions. It allows Windows 10 users and administrators to view security events in an audit…

Web server security: Active defense

Read the original article: Web server security: Active defense Introduction Active defense is an approach taken to prevent attacks from adversaries. In this article, we discuss the various active defenses and countermeasures that can be enforced in an attempt to……

Firewalls For ICS/SCADA Environments

Read the original article: Firewalls For ICS/SCADA Environments Introduction Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) environments are facing increasing exposure to the internet, giving nefarious parties and malicious… Go on to the site to read…

VulnHub CTF Walkthrough: Sar 1

Read the original article: VulnHub CTF Walkthrough: Sar 1 In this article, we will solve a Capture the Flag (CTF) challenge which was posted on Vulnhub. As you may know from previous articles, vulnhub.com is a platform which provides vulnerable……

Phishing techniques: Contest winner scam

Read the original article: Phishing techniques: Contest winner scam Introduction: Phishing is evolving via bogus online ads and webmail Phishing scams are among the most serious and pervasive frauds operating today. One of the most used tactics is a scheme…

Certifications compared: GCFA vs. CSFA vs. CCFP

Read the original article: Certifications compared: GCFA vs. CSFA vs. CCFP Introduction: The importance of forensic analysts An increase in computer crimes is driving the need for more certified forensics analysts. These specialists have a crucial role in gathering… Go…

Understanding Windows Services

Read the original article: Understanding Windows Services Introduction In order to understand the functions that Windows services perform, we need to first understand the role breakdown of Windows systems in general.  Many people have heard of… Go on to the…

COVID-19: How criminals take advantage of the pandemic

Read the original article: COVID-19: How criminals take advantage of the pandemic Introduction Cybercriminals are taking advantage of the feeling of widespread panic to carry out new waves of cyberattacks. The latest headlines are reporting everything phishing to malware campaigns……

Windows 10 Auditing Features

Read the original article: Windows 10 Auditing Features Introduction “At 7:04am on July 22nd, our bad actor successfully obtained access to the user’s workstation. At 7:06am, they attempted to install malicious programs but were… Go on to the site to…

Web Traffic Analysis

Read the original article: Web Traffic Analysis Introduction: Significance and Impact In 2018 DayTrek Corp, a broadband and data communications company in the UK discovered a cross-site request-exploit on their routers. Attackers would hack into… Go on to the site…

Understanding Windows Registry

Read the original article: Understanding Windows Registry Introduction Let’s say a user just finished installing a piece of recommended software. They weren’t really familiar with the source, but the potential benefits would be excellent. Immediately after… Go on to the…

Windows Internals for Malware Analysis

Read the original article: Windows Internals for Malware Analysis Introduction This article defines Windows internals and illustrates tools which can be used to explore Windows internal systems. We’ll be defining malware and describing how they can be analyzed by… Go…

Symfonos 5.2: CTF Walkthrough

Read the original article: Symfonos 5.2: CTF Walkthrough Introduction In this article, we will solve a Capture the Flag (CTF) challenge that was posted on the VulnHub website by an author named ‘Zayotic.’ As per the description given by the…

Phishing techniques: Expired password/account

Read the original article: Phishing techniques: Expired password/account Introduction Nowadays, a fair number of phishing attacks have been linked to expired password scams. This is a tactic used to steal identifying information and account access by luring users into… Go…

Overview of Phishing Techniques: Fake Websites

Read the complete article: b’Overview of Phishing Techniques: Fake Websites’ This post doesn’t have text content, please click on the link below to view the original article.   Advertise on IT Security News. Read the complete article: b’Overview of Phishing…

CTF Walkthrough – Five86: 2

In this article, we will find an answer to a Capture the Flag (CTF) challenge published on VulnHub. As you may know from previous articles, VulnHub.com is a platform which provides vulnerable… Go on to the site to read the…

Malware spotlight: Sodinokibi

Introduction Ransomware is not new at this point in time and will be with us for the foreseeable future, as new types of ransomware are constantly emerging. And sometimes, new ransomware makes a big… Go on to the site to…

Information security auditor certifications

Introduction For those with a passion for information security and a mind for auditing, the role of information security auditor is tailor-made. Not only does it allow you to work in information… Go on to the site to read the…

Web server security: Infrastructure components

Introduction Cybercriminals understand that your website is not only the face of your organization, but often also its weakest link. With just one misconfigured port, malicious spearphishing email or… Go on to the site to read the full article  …

Network traffic analysis for IR: Data exfiltration

Introduction Understanding network behavior is a prerequisite for developing effective incident detection and response capabilities. ESG research has found that 87 percent of companies use Network… Go on to the site to read the full article   Advertise on IT…

Logical Instructions

Introduction This article defines logical instructions as executed by x86 processors. It goes on to describe four key classifications of logical instructions in brief. This article is designed for… Go on to the site to read the full article  …

Networking Basics for Reverse Engineers

Introduction This article will define network reverse engineering, list tools used by reverse engineers for reverse engineering and then highlight the network basics required by such engineers. The… Go on to the site to read the full article   Advertise…

Ethical hacking: SNMP recon

Introduction In this article, we will discuss the various methods one could take to perform reconnaissance on the SNMP protocol. As you may know, SNMP reveals too much information about targets that… Go on to the site to read the…

AI and machine learning and their uses in cybersecurity

Artificial intelligence and machine learning trends Although artificial intelligence and its subfield of machine learning have been applied in cybersecurity for some time, the speed of adoption is… Go on to the site to read the full article   Advertise…

Stack Instructions

Introduction This article will introduce readers to the assembly concepts in relation to the stack. We will discuss basic concepts related to stack and various registers, and the instructions used… Go on to the site to read the full article…

Loops

Introduction In the previous article, we discussed how if statements can be spotted in the disassembly of a binary. We learned that if conditions are translated to conditional jumps when exploring… Go on to the site to read the full…

Stepping

Introduction Single-stepping is one of the most powerful features of a debugger, as it allows a reverse engineer to execute a single instruction at a time before returning control to the debugger…. Go on to the site to read the…

How to use Protected Folders in Windows 10

Introduction Ransomware is one of the biggest threats faced by organizations today. After encrypting all files on servers and desktops, ransomware perpetrators demand payment before decrypting what… Go on to the site to read the full article   Advertise on…

Ethical hacking: Stealthy network recon techniques

Introduction In this article, we shall discuss some stealthy reconnaissance techniques that should be employed during a hacking exercise. It’s important to know which scan to use, especially when you… Go on to the site to read the full article…

How hackers check to see if your website is hackable

Introduction “Memento mori” is Latin for “Remember that you are mortal.” According to tradition, this phrase was whispered to triumphant Roman military commanders on parades, to remind them they… Go on to the site to read the full article  …

How to configure VPN in Windows 10

Introduction This article defines Virtual Private Network (VPN) and the three basic connection types of VPN: remote user, third-party to mask source IP and user activities, and site-to-site-VPN. It… Go on to the site to read the full article  …

Race Condition Vulnerabilities

Introduction to race conditions Race condition vulnerabilities are an artifact of parallel processing. The ability to run multiple different execution threads in parallel can create vulnerabilities… Go on to the site to read the full article   Advertise on IT…

DLL Load Order Hijacking

Introduction DLL load order hijacking is a popular technique used to force a legitimate program to load a malicious DLL file in Windows by abusing Windows’ DLL load order feature. In this article, we… Go on to the site to…

Arithmetic Instructions

Introduction This article defines arithmetic instructions as executed by x86 processors. It goes on to describe in brief, four key classifications of arithmetic instructions: addition, subtraction,… Go on to the site to read the full article   Advertise on IT…

Malware spotlight: Nemty

Introduction If the last five years or so have proven anything, it is that ransomware is here to stay as a threat in the cybersecurity wild. This should not be used as rationale to simply ignore the… Go on to…

What Are Packed Executables?

Introduction The battle between cybersecurity and malicious files is ever-changing, as the goalposts are always being moved. Whenever analysts figure out a way to reverse-engineer a particular type… Go on to the site to read the full article   Advertise…

Phishing technique: Message from a friend/relative

Introduction Like many other phishing scams featured on this site, friends-and-family imposter scams are common. These scams usually begin with a phone call impersonating a friend or relative, or… Go on to the site to read the full article  …

Conditionals and Jump Instructions

Introduction This article will briefly discuss conditionals and jump instructions. Conditionals are commonly used in assembly for comparison so that other instructions can make use of the output… Go on to the site to read the full article   Advertise…

Least Privilege Vulnerabilities

Introduction The principle of least privilege is an essential component of information assurance and security activities. According to the National Institute of Standards and Technology (NIST),… Go on to the site to read the full article   Advertise on IT…

Phishing technique: Message from the government

Introduction With the evolution of the internet, online services have grabbed the attention of every sector, including the government. Nowadays, online amenities are available in almost all… Go on to the site to read the full article   Advertise on…

Modbus, DNP3 and HART

Modbus Modbus is a serial communication protocol developed by Gould-Modicon systems (now Schneider Electric) in 1979 for integrating and using it with PLCs (Programmable Logic Controller). Modbus has… Go on to the site to read the full article   Advertise…

Web server protection: How the web works

As of January 2020, there are almost 4.54 billion people around the world that are active internet users. This means that the internet is reaching just past 59 percent of the world’s population. … Go on to the site to read…

Top 4 industries for cybersecurity jobs

Defending against cybercrime Cybercrime bears tremendous costs for organizations, with some estimates showing the annual cost of cybercrime to reach $6 trillion by 2021. But while there’s no shortage… Go on to the site to read the full article  …

How to configure UAC in Windows 10

Introduction When I was working on this article, I was trying to figure out something witty for the title, but all I kept coming up with was “Fear and Loathing in UAC.” Very few built-in… Go on to the site…

How to configure UAC in Windows 10

Introduction When I was working on this article, I was trying to figure out something witty for the title, but all I kept coming up with was “Fear and Loathing in UAC.” Very few built-in… Go on to the site…

Cyber Work podcast: Election security issues for 2020

Introduction In this episode of Infosec’s Cyber Work Podcast series, host Chris Sienko spoke with Adam Darrah about foreign vote tampering and other election security concerns for the upcoming 2020… Go on to the site to read the full article…

Malware spotlight: Ekans

Introduction Industrial Control Systems, or ICS, have been the target of malware for some time now. Most of these threats target Windows systems and Windows processes, and aside from targeting… Go on to the site to read the full article…

Information security manager certifications

Introduction For many organizations, the role of information security (IS) manager is both pivotal and strategically important. Among their many responsibilities are managing an organization’s… Go on to the site to read the full article   Advertise on IT Security…

Loops

Introduction In the previous article, we discussed how if statements can be spotted in the disassembly of a binary. We learned that if conditions are translated to conditional jumps when exploring… Go on to the site to read the full…