Cybersecurity
Palo Alto Networks Extends Scope of CNAPP Reach
Via a Darwin update, Palo Alto Networks this week added six capabilities to its cloud-native application protection platform (CNAPP) ...
Security Boulevard
EU Authorities Deal Blow to RagnarLocker Ransomware Operations
Law enforcement agencies throughout Europe and the United States took a big swing at the notorious RagnaLocker ransomware group, arresting a malware developer, seizing parts of its infrastructure, and shutting down negotiations ...
Security Boulevard
DEF CON 31 – Wesley McGrew’s ‘Retro Exploitation – Vintage Computing As A Vuln Research Playground’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
On Detection: Tactical to Functional
Part 9: Perception vs. ConceptionThe concepts discussed in this post are related to those discussed in the 9th session of the DCP Live podcast. If you find this information interesting, I highly ...
Bloodhound Enterprise: securing Active Directory using graph theory
Irshad Ajmal Ahmed | | Active Directory, bloodhound-enterprise, blue-team-tool, Cybersecurity, red-team-tools
BloodHound Enterprise: securing Active Directory using graphsPrior to my employment at SpecterOps, I hadn’t worked in the information security industry- as a result, many security related terms and concepts that were tossed around ...
DEF CON 31 – ElfMaster’s ‘Revolutionizing ELF Binary Patching With Shiva A JIT Binary Patching System For Linux’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...
U.S. Seizes Money, Domains Involved In North Korea IT Worker Scam
U.S. law enforcement agencies over the past year seized 17 web domains and almost $1.5 million as part of an ongoing effort to shut down a North Korean program to plant IT ...
Security Boulevard
How to Make Your Threat-Hunting Program More Effective
As threats increase, here are three ways to improve the effectiveness and success of your organization's threat-hunting program ...
Security Boulevard
Understanding The FTC Safeguards Rule
Nik Hewitt | | advice, application protection, Best Practices, Cybersecurity, lateral movement, microsegmentation, next gen security, security, Security Research, zero trust
The FTC Safeguards Rule requires financial institutions to guarantee protection of sensitive customer data The FTC Safeguards Rule mandates that “financial institutions” should create comprehensive information security frameworks that ensure the protection ...
DEF CON 31 – Laurie Kirk’s ‘Runtime Riddles – Abusing Manipulation Points In The Android Source’
Marc Handelman | | Cybersecurity, cybersecurity education, DEF Con 31, DEFCONConference, Information Security, Infosecurity Education, OSINT, Security Architecture, Security Conferences, Threat Hunting
Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada; via ...