How to get into malware analysis, a field that sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering
How to get into malware analysis, a field that sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering
In October 2024, the fantasy sports platform SuperDraft suffered a data breach that exposed over 300k customer records. The breach contained 24GB of data including email addresses, usernames, transactions, latitudes and longitudes, dates of birth and bcrypt password hashes.
A blog about developing cyber threat intelligence (CTI) metrics.
Learn more about the CIS Critical Security Controls v8 released May 18, 2021.
In late 2023, the online jewellery store GLAMIRA suffered a data breach they attributed to “an unauthorised individual [who] briefly accessed one of our servers”. The data was subsequently published on a popular hacking forum and included 875k email addresses, names, phone numbers and purchases.
A proxy firewall is a network security system that protects network resources by filtering messages at the application layer. It […]
In cryptography, a public key is a large numerical value that is used to encrypt data. The key can be […]
Exploring the power of the PEAK Threat Hunting framework
In September 2024, over 90M rows of data on French Citizens was found left exposed in a publicly facing database. Compiled from various data breaches, the corpus contained 28M unique email addresses with the various source breaches each exposing different fields including name, physical and IP address, phone number and partial credit card data including payment type and last 4 digits.
A blog about the ipdate to the SANS SEC587 OSINT course.