This Virus is Dangerous! Here’s What I did!
August 31, 2022
This Virus is Dangerous! Here’s What I did! Yeah! I picked the wrong (or maybe the right) virus to analyze. Answering questions from the community. “How to check if a file is malicious or contains malware?” ZIP, EXE, DOC, XLS, PDF, JPG, MP4 – works with any……
0 Comments1 Minute
Deepfake: What is It and How to Stay Safe?
August 30, 2022
Separating fact from fiction when surfing the web has become increasingly complex over the past decade. People are less likely to examine the information they consume as their dependence on electronic communication, and virtual collaboration technology has increased. Deepfake cost news exceeding…
0 Comments8 Minutes
10-Step Security Validation Checklist for CISOs
August 29, 2022
Are you confident that your security controls will allow you to relax while you’re away from the office on a well-deserved vacation? More importantly, do you have a solid action plan to ensure a smooth transition? | Security Validation Checklist Whether you’re leaving or returning to…
0 Comments5 Minutes
Changing Human Behavior in Cyber Security
August 26, 2022
Live interview with Ragnar Sigurdsson, CISSP, CEH and Cyber Psychologist Dr. Maria Bada from AwareGO. Social engineering attacks are becoming more sophisticated as hackers utilize human psychology for crafting their campaigns. Yet, there is still the notion that cyber security awareness…
0 Comments1 Minute
How to Install Kali Linux on Android WITHOUT Root – NetHunter and Termux
August 25, 2022
How to Install Kali Linux on Android WITHOUT Root – NetHunter and Termux This works for most versions of Android. (please be advised that Android 12 OS does not play nice sometimes). We will use the Termux application to install Kali Linux on our Android device. Termux is an…
0 Comments1 Minutes
Borat RAT: A Malicious Package that Combines Remote Access, Spyware, and Ransomware!
August 25, 2022
Cyble, an Atlanta-based cyber risk intelligence firm, discovered a new Remote Access Trojan (RAT) malware. So what distinguishes this Borat RAT malware enough to be named after Sacha Baron Cohen’s comic creation? What are Remote Access Trojans (Borat RAT)? RAT malware typically assists…
0 Comments6 Minutes
What You Should Know About Smishing
August 24, 2022
Smishing, the use of text messaging to trick individuals into disclosing critical personal information, is on the rise. In this article, we’ll look at why smishing is on the rise and what you can do to mitigate the dangers to your company and staff. What exactly is smishing? Smishing is a…
0 Comments6 Minutes
Phishing Method for Bypassing MFA Discovered using WebView2
August 23, 2022
Phishing Method Using the Microsoft WebView2 software, a security researcher has devised a new phishing tactic. This new approach can bypass MFA and steal login cookies, posing significant threats to the organization and individual users. Phishing Method was discovered by security researchers,…
0 Comments6 Minutes
What is a Managed Security Operations Center (SOC)?
August 22, 2022
A Security Operations Center (SOC) is critical to the effectiveness of an organization’s security posture. Security Operations Center | This article discusses the advantages of using a managed SOC rather than setting up and administering your own in-house 24×7 security center. What…
0 Comments9 Minutes
The Last Selfie on Earth
August 19, 2022
AI-generated selfie photographs show what the last day on Earth may look like. They depict some quite horrific visions of how it all may end. All thanks to DALL-E 2, an artificial intelligence picture generator. But what about AI in cyber security? In this LIVE podcast, we flip AI on its…
0 Comments1 Minute