The recent FOR528 course update brings about streamlining of course timing, better addresses the differences between ransomware and cyber extortion, and provides new hands-on lab opportunities.
The recent FOR528 course update brings about streamlining of course timing, better addresses the differences between ransomware and cyber extortion, and provides new hands-on lab opportunities.
As we move further into 2024, we must be cautious (maybe even fearful!) of ransomware cases increasing even more than in previous years. Though governments around the world are taking more interest in the worldwide threat, we can see from the increase of cases that our actions have not been enough to thwart the ransomware threat. As new groups continue to form, former groups continue to evolve into new brands, and the big players continue to ramp up their efforts, we must remain vigilant and focus on our preparation and early detection capabilities.
In December 2023, hundreds of gigabytes of data allegedly taken from Indian ISP and digital TV provider Hathway appeared on a popular hacking website. The incident exposed extensive personal information including 4.7M unique email addresses along with names, physical and IP addresses, phone numbers, password hashes and support ticket logs.
While there is no magic bullet solution on how to answer a question about emerging technologies and threat trends, this first blog post hopefully provided some insights and perhaps starting points on the various dimensions to consider when starting your research.
In October 2017, the now defunct Brazilian service for retrieving subtitles in Portuguese Legendas.TV suffered a data breach that exposed nearly 4M customer records. The impacted data included names, usernames, email and IP addresses and unsalted SHA-1 hashes.
This blog series is designed as a primer to jumpstart analytic skills for junior analysts or those transitioning into CTI from a job area
What is cybercrime? Cybercrime is any criminal activity that involves a computer, network or networked device. While most cybercriminals use […]
Diving deeper into how tools like Terraform can refine IAM strategies to forge a more secure, efficient, and future-ready cloud infrastructure.