Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  RingCentral Voicemail Phish

Chef’s Special:  KONNI Malware Phish

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide a warning, ...

Continue Reading →
0

Guest Post – A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same

As you are studying for the CISSP, CASP+, or Security+, you will come across these two important NIST frameworks.  They seem the same, but they are not.

If you are deploying one or both of these frameworks in your organization, understanding the difference between them is even more important.

Today we are republishing an article by Rick Tracy.  Rick Tracy is the senior vice ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker’s bail hearing held online via Zoom with screen sharing enabled… what could possibly go wrong?  Well, damn near everything as it turns out.  Maybe IT needs to help these judges learn how Zoom works?


Top 5 Questions About Ransomware and ...

Continue Reading →
0

Friday Phish Fry

Phishing Email Alerts

Catch of the Day:  Ionos Email Credentials Phish

Chef’s Special:  Zoom Meeting Phishing Attacks

Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.

I would be delighted to accept suspicious phishing examples from you.  Please forward your email to phish@wyzguys.com.

My intention is to provide ...

Continue Reading →
0

Learning How to Install, Configure, Maintain, and Repair a Computer

Today I am continuing the thread I started last week about breaking into information technology and cybersecurity as a career.  Let’s begin at the beginning.  No matter where you end up in your career, you can expect to start in an entry level position in a repair center, help desk, or desk side support team.  To be qualified for this position you need to know how to install, configure, maintain, and ...

Continue Reading →
0

How to Get Experience

One of the persistent questions I am asked, as an instructor, is a variation of:   “Every job I apply for wants experience, how do I get experience without a job?”  The flip side of that question comes from IT managers, and sounds like:  “We see too many candidates with computer degrees that lack any hands on computer experience or working knowledge of computers or networking.”

The problem is most college degree ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


AA20-209A: Potential Legacy Risk from Malware Targeting QNAP NAS Devices

Original release date: July 27, 2020

CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP.

All QNAP NAS devices are potentially vulnerable to QSnatch malware if not ...

Continue Reading →
0
Page 3 of 192 12345...»