AVERAGE RANSOM PAYMENT HAS GONE UP TO 71% IN 2022
June 5, 2022
Palo Alto Network’s threat intelligence arm, Unit 42, has found the average ransomware payment in cases worked by Unit 42 incident responders rose to US$925,162 during the first five months of 2022, approaching the unprecedented US$1 million mark, a 71 percent increase from last year. That total…
0 Comments3 Minutes
Ch-1. Introduction to Cyber Security for Small and Medium Businesses
June 2, 2022
Welcome to our Cyber Security Guide for Small and Medium Businesses. Each video in this guide is 2-5 minutes long. There are 10 sections in this guide, some of which are still in development. Subscribe to receive notifications as soon as new sections are out. If you have any questions,…
0 Comments2 Minutes
EASY XRDP Setup Remote Desktop in Kali Linux
May 24, 2022
EASY XRDP Setup Remote Desktop in Kali Linux No more cables, KVMs, keyboards and mice. XRDP is one of the best Linux remote desktop tools and can be easily used with the Windows Remote Desktop app! In this Kali Linux beginner tutorial, I use the Microsoft Remote Desktop for Mac (and…
0 Comments1 Minute
What is data retention and why is it important?
May 22, 2022
It’s not uncommon to hear about businesses storing large volumes of personal data. There are endless reasons as to why personal data may be collected and processed, such as to build user profiles in order to send targeted products and services. However, many businesses fail to consider what…
0 Comments5 Minutes
5 Tips for Measuring Your Company’s Security
May 5, 2022
Cybersecurity is a priority for any organization and a big-ticket budget line item. But before investments in security are made, your organization must understand what it is doing right and where improvements to your cybersecurity program are needed. Businesses can significantly improve their…
0 Comments9 Minutes
Reverse Shell with Meterpreter & Metasploit – Kali Linux Tutorial
Kali Linux Tutorials,OFFENSIVE ETHICAL HACKING TUTORIALS
April 19, 2022
Reverse Shell with Meterpreter & Metasploit – Kali Linux Tutorial In this beginner tutorial, you will learn the basics of creating a reverse shell using Setoolkit, Meterpreter, and Metasploit on Kali Linux. At the end of the tutorial, I will show you the principles and…
0 Comments1 Minutes
Complete Beginner OpenVAS Vulnerability Scanning Tutorial – Cyber Security // Kali Linux
Kali Linux Tutorials,OFFENSIVE ETHICAL HACKING TUTORIALS
April 3, 2022
Complete Beginner OpenVAS Vulnerability Scanning Tutorial – Cyber Security // Kali Linux OpenVAS is more than a vulnerability Scanner! From scan automation and continuous GVMD, SCAP and CERT feed updates to remediation tasks and vulnerability management, this network…
0 Comments1 Minute
EASY Kali Linux Install on Windows – Cyber Beginner Tutorial
March 28, 2022
EASY Kali Linux Install on Windows – Cyber Beginner Tutorial ✨✨✨ Hyper-V Virtual Machine is by far the BEST way to install Kali Linux on Windows 10 or 11! This is because Hyper-V is a Type 1 Hypervisor. In this ethical hacking, cyber security, and beginner tutorial, I show you…
0 Comments1 Minutes
NMAP Basics Tutorial for Kali Linux Beginners – Cyber Security
Kali Linux Tutorials,OFFENSIVE ETHICAL HACKING TUTORIALS
March 23, 2022
NMAP Basics Tutorial for Kali Linux Beginners – Cyber Security If you are new to infosec, cyber security, and pen-testing, the way I explain the basic stuff about network scanning, info gathering, and Nmap is unlike other beginner tutorials. I keep this simple and useful,…
0 Comments1 Minute
HACKED? DoN’t dO tHiS!
March 18, 2022
When your email, credit card, or identity gets hacked, it can be a nightmare. Knowing what to expect can be of help. Knowing how to head off the hackers is even better! Join us LIVE this Friday, March 18 @ 12:00 pm. In this live PODCAST, we dive into the steps that you should do upon…
0 Comments1 Minute