This was shared on Facebook
Continue Reading →
AUG
Original release date: July 27, 2020
CISA and NCSC are investigating a strain of malware known as QSnatch, which attackers used in late 2019 to target Network Attached Storage (NAS) devices manufactured by the firm QNAP.
All QNAP NAS devices are potentially vulnerable to QSnatch malware if not ...
Continue Reading →Catch of the Day: Why We Don’t Do Product Endorsements
Chef’s Special: Spoofing SharePoint Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide a ...
Continue Reading →How do you get a job in cybersecurity? Here’s how it worked for me.
I have joined several LinkedIn and Facebook groups that are focused on cybersecurity, and very frequently there is a post from a newcomer asking the question “How do I get a job in cybersecurity?” The actual question can vary, from “what certifications are best, where can I look for ...
Continue Reading →Original release date: July 16, 2020
This Activity Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK™) and Pre-ATT&CK frameworks. See the MITRE ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
Attributing malicious cyber activity that uses network ...
Continue Reading →Today is the annual recognition event for all the sysadmins, technical support specialists, and cybersecurity professionals who keep your computers and networks operational and secure. Gifts are appreciated.
Catch of the Day: Fake Domain Renewal Phish
Chef’s Special: Incomplete Document Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, ...
Continue Reading →As an instructor of information technology and cybersecurity certification prep classes, my students have all expressed concern about taking the certification exam. Ideally, a student reads the text, takes the classes, uses a good practice exam for testing preparation, and when it all comes together, schedules an exam, takes and passes the exam. There is a perfect moment when test taking is ...
Continue Reading →I have a client who is the victim of an email bomb. She started receiving hundreds of mails from websites all over the Internet. Nearly all of them were the kind of subscription confirmation email you would get after signing up for a newsletter, forum, or other subscription service. When I say they came from all over, she ...
Continue Reading →