My Courses
-

AI is revolutionizing the field of cybersecurity adversarial testing, according to the insights of the founder of Pentera.
In 2015, the founder of a cybersecurity testing software company envisioned the necessity of automated penetration testing, a concept that faced initial scepticism. Today, with…
-

Numerous Dell laptops are at risk of being compromised, allowing unauthorized access and ongoing malware infections.
A wide range of vulnerabilities, collectively known as “ReVault,” affects millions of Dell laptops utilised by government agencies, cybersecurity professionals, and enterprises globally. These vulnerabilities…
-

The frequency of cyber attacks targeting AI infrastructure is increasing, with significant vulnerabilities being identified.
Cybercriminals have increasingly targeted high-value infrastructure that supports the training, tuning, and serving of modern artificial intelligence models. Over the past six months, incident-response teams…
-

Microsoft is hosting the Zero Day Quest Hacking Contest, offering rewards that can reach as high as $5 million.
Microsoft has announced the return of its groundbreaking Zero Day Quest, the largest public hacking event in history, offering unprecedented bounty rewards of up to…
-

The U.S. Treasury has issued a warning regarding cryptocurrency ATMs contributing to illegal activities.
The U.S. Department of the Treasury’s Financial Crimes Enforcement Network (FinCEN) has issued a significant warning regarding the misuse of Convertible Virtual Currency (CVC) kiosks…
-

CISA has issued a warning regarding vulnerabilities in D-Link products that are currently being exploited in attacks.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a new alert, adding three vulnerabilities affecting D-Link devices to its Known Exploited Vulnerabilities (KEV)…
-

Over 10,000 harmful TikTok Shop websites are targeting users to obtain login details and distribute malware.
A sophisticated cybercriminal campaign known as “ClickTok” has emerged as a significant threat to TikTok Shop users globally. Researchers have identified over 10,000 malicious domains…
-

The Compliance Checklist for Network Security: 25 Controls That Are Mapped and Prepared for Auditing
Following new SEC rules announced on July 26, 2023, U.S. public companies are required to disclose any cybersecurity incident deemed ‘material’ within four business days…
-

How to Obtain Real-Time Indicators of Compromise from Incidents in 15,000 Security Operations Centers.
Cybersecurity is fundamentally about staying one step ahead of potential threats. The security of business assets relies heavily on proactive threat detection and rapid response,…


