- The cyber mercenary group known as Void ...
This site, like millions of others, has a certificate from Let’s Encrypt. Farewell, Peter Eckersley, PhD, who helped make it all possible.
New data shows attempted ransomware attacks are occurring far more frequently while a lack of confidence is found in security measures and solutions to stop ransomware attacks.
We’d like to think ...Continue Reading →
Accelerate your cybersecurity career with the world’s premier cybersecurity certification – the Certified Information Systems Security Professional (CISSP). The CISSP certification was created to ensure ...Continue Reading →
Catch of the Day: Encrypted Wire Transfer Phish
Chef’s Special: Smash and Grab Phish
Examples of clever phish that made it past my spam filters and into my inbox. Some are sent by clients or readers like you, and other reliable sources on the Internet.
You can send phishing samples to me at email@example.com.
My intention is to provide a warning and show ...Continue Reading →
Original release date: June 22, 2022
Cybersecurity authorities from the United States, New Zealand, and the United Kingdom have released a joint Cybersecurity Information Sheet (CIS) on PowerShell. The CIS provides recommendations for proper configuration and monitoring of PowerShell, as opposed to removing or disabling it entirely due to its ...Continue Reading →
It is nearly five years since I started curating this weekly Saturday cybersecurity news round-up. I hope you are finding this column useful.
Beginning June 1, 2022, additional pretest items and time will be added to the CISSP exam for the Computerized Adaptive Testing (CAT) format.The current CISSP CAT exam contains 25 pretest (unscored) items. The addition of 25 more items will bring the total count to ...
Original release date: March 3, 2022
The National Security Agency (NSA) has released a new Cybersecurity Technical Report (CTR): Network Infrastructure Security Guidance. The report captures best practices based on the depth and breadth of experience in supporting customers and responding to threats. Recommendations include perimeter and internal network ...Continue Reading →
I will be presenting this one-hour seminar on ransomware for the training company Vinsys
Be #Ransomware Ready! Learn to deal with the modern ransomware.
In our webinar “#Cybersecurity: The Evolution of Ransomware” by Mr. Bob Weiss, you will get valuable insights on how the ransomware attacks are evolving and transforming with technological advancements.
Reduce ...Continue Reading →