These hackers dodge Windows and target Linux as they look to steal phone data

A stealthy hacking group is infiltrating telecommunications companies around the world in a campaign which researchers have linked to intelligence gathering and cyber espionage.  The campaign, which has been active…

Red teaming tutorial: Active directory pentesting approach and tools

Infosec Institute –  Infosec Institute –  There are a number of tools you should use when it comes to active directory (AD). Inveigh and responder as a start point Many…

Multi-Factor Authentication (MFA) and Other Cybersecurity Must-haves

Building up a robust security department and having a strong security posture doesn’t happen overnight. Between ever-evolving threats, new vulnerabilities, increasing attack surfaces, and resource management, a cybersecurity leader has…

The Complete Guide to IoT Security and What Every Business Owner Needs to Know

We might feel that technology plays an enormous role in our lives, always with our eyes on our phones or turning on the TV right after we got home –…

What Is Hashing and How Does It Work?

The notion of a hash is one that you’ll come across repeatedly in any discussion regarding cybersecurity. These seemingly random sequences of numbers and letters are created and employed in…

DDoS Operator Arrested by the Ukrainian Police

As my colleague Cezarina explained in a previous article, a botnet is a network of infected computers or other internet-connected devices, that communicate with each other in order to perform the…

Pitfalls To Avoid With Your Security Awareness Training (SAT) Program

If you’re tasked with securing your organization, your employees are usually one of the first priorities. Malicious actors know that employees are often an easy way to break into a…

What Is Lateral Movement? Lateral Movement Explained

Network Lateral Movement or lateral movement in cybersecurity refers to a technique used by hackers to progressively move from a compromised entry point to the rest of the network as…

Aerial threat: why drone hacking could be bad news for the military

Padlokr –  Padlokr –  Are military drones a security threat to their own operators? Gorodenkoff/Shutterstock Mohiuddin Ahmed, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University Unmanned aerial vehicles, more…

The real dangers of vulnerable IoT devices

The landscape of the Internet of Things (IoT) devices has been explored strongly by criminals in the last few years, causing enormous constraints for home users and companies from the…