A blog about strategies for training and hiring in the US government, a Black Rainbow case study
A blog about strategies for training and hiring in the US government, a Black Rainbow case study
Dangling pointers might not create as many security issues as they used to, but this common programming error can still […]
A blog about the newly update SANS SEC541: Cloud Security Threat Detection course.
A blog about using SOAR to transform an organization’s cybersecurity culture.
A blog on the impact of training on Mastercard’s hiring success
Discover the role of a Security Operations Center (SOC) Analyst, including essential skills, daily activities, career growth, and more.
A blog about developing successful cybersecurity maturity models at Microsoft, a use case
A blog about cybercrime intelligence and tracking threat groups like SCATTERED SPIDER and The Com.
A blog summarizing how Leidos addressed cybersecurtiy hiring challenges
In June 2024, a huge trove of data from spyware maker mSpy was obtained by hacktivists and published online. Comprising of 142GB of user data and support tickets along with 176GB of more than half a million attachments, the data contained 2.4M unique email addresses, IP addresses names and photos. The data was predominantly support tickets seeking help to install the spyware on target devices, whilst the attachments contained various data including screen grans of financial transactions, photos of credit cards and nude selfies.