OSCP Exam Change

As a leader in the cybersecurity training space, we at Offensive Security are incredibly proud of our flagship course, Penetration Testing with Kali Linux (PWK), and the value it has…

How Decryption of Network Traffic Can Improve Security

Most industry analyst firms conclude that between 80-90 percent of network traffic is encrypted today. Jeff Costlow, CISO at ExtraHop, explains why this might not be a good thing. Strong…

Yanluowang Ransomware Tied to Thieflock Threat Actor

Links between the tactics and tools demonstrated in attacks suggest a former affiliate has switched loyalties, according to new research. A threat actor previously tied to the Thieflock ransomware operation…

Consent phishing: How attackers abuse OAuth 2.0 permissions to dupe users

When cybercrime historians look back on the first half of the 21st century, they will undoubtedly point to phishing as the most successful, and therefore, the most prevalent technique used…

Ethical Hacking, book review: A hands-on guide for would-be security professionals

Ethical Hacking: A Hands-on Introduction to Breaking In • By Daniel G Graham • No Starch Press • 376 pages • ISBN 9781718501874 • £41.99 / $49.99    The parlous…

Pysa Ransomware: Overview, Operation Mode, Prevention

At the very least, the Pysa ransomware was first deployed in October 2018. The initial versions of the ransomware created encrypted files with the “.locked” extension, which is common among…

A full analysis of the BlackMatter ransomware

BlackMatter is the name given the most recent ransomware in the wild and equipped with the tools and techniques from DarkSide, REvil and LockBit 2.0 ransomware families.  BlackMatter is a…

Microsoft: Patch Zoho Bug Now to Stop Chinese Hackers

Microsoft: Patch Zoho Bug Now to Stop Chinese Hackers Microsoft has warned that Chinese actors are actively exploiting a known Zoho vulnerability to target defense, education, consulting and IT sector…

November Continues Streak of Quiet Patch Tuesdays

Trend Micro – Trend Micro – November continues a recent pattern of relatively peaceful Patch Tuesday cycles. There were only six vulnerabilities rated as Critical this month, with 49 more…

Unified Endpoint Management Explained: (Why) Does Your Company Need One?

This post is also available in: Danish Gone are the days when a lone system administrator would perch upon the ledge of your desk to help you with menial tasks…