-
Yara and related tools
I am a bit new with Yara. LOKI or THOR or FENRIR or YAYA ? or all of them as together utilized to leverage by YARA ? Any recommendation which one or which ones are capable of scanning anomaly based on your experiences ?
-
SANS Sec 403 Secrets to Successful Cybersecurity Presentations - taken it?
I'm planning to take SANS Sec 403 to become a better presenter, has anyone taken it? Do you recommend it? Any alternatives?
-
Anyone know SQL
Im self learning this since its been 3 years at the junior college when i last took an SQL class, i forget everything and i have another sql class coming up this semester towards that dam 4 year degree, i have no idea why im getting this error, any ideas. CREATE TABLE 'company'.'employee'( 'fname' VARCHAR(15) NOT NULL,…
-
OpenEDG Python Institute Certifications
Thoughts on this governing body for Python certifications? I've been grinding for a while now, on some specific libraries in Python and building automation mainly around Excel, managing data frames. I was thinking, well heck I might as well work through some of these? Thoughts? I think it would be a cool idea to work…
-
elearnsecurity labs for THP and IHRP
Does anyone have a premium plan with INE is it worth it to buy for labs for incident response courses like IHRP THP and DFP ?
-
GDPR compliance
What is the GDPR compliance checklist?
-
SANS or Infosec?
The nature of my work has provided me with a number of projects in the past year that require SCADA/ICS security reviews. I need to learn more about this specific subset of cybersecurity. Hoping for advice on choosing between tow options: SANS ICS410 course Infosec SCADA/ICS Boot Camp Both are expensive but I'm willing to…
-
On-Premise Identity and Access Management
Hello. I am looking for an on-premise IAM solution case study. Its framework and features. Anybody using any on-prem solution currently?
-
Top 10 Cyber Security Implementations for a Small Business
Hi y'all. I was curious in finding out what you folks feel fall into the top 10 cyber security implementations that a typical small business of 50-100 employees would need. I'm doing this as research on the security need that's in most demand so I can identify resources and acquire the skill set. Here's a tentative list of…
-
Pentesting as a Career
I am audit and compliance professional who wants to move to a career as a pen tester.I recently passed GSEC, have some experience in IT Auditing. Currently I have subscription for Cybrary and TryHackMe. Can someone help me understand how do I land my first role as pen tester?How do I really sell my resume for entry level…
-
New to Cyber
I am audit and compliance professional who is exploring a career in cybersecurity. I really enjoy Forensics Windows and Linux as well as Pentesting. I recently passed GSEC and working towards GCIH, have some experience in IT Auditing. Currently I have subscription for Cybrary and TryHackMe. Need some guidance on how should…
-
Is linkedin premium worth it?
I've read some opinions that it's worth it, but I have a tough time justifying $30 a month when I'm not actively looking for work. Maybe if it was $30 a year, I might consider signing up, but $30 a month? That's as much as my Cell phone bill and I use that a LOT more than LinkedIn. I feel it's WAY over priced for what they…
-
Threat Intel feed
Hi experts, I would like ask for your recommendation/inputs about Threat Intel platforms. Is it worth it to pay for threat intel feeds? If yes, which platform? If no, what's the best strategy to utilize open source threat intel feeds? Thank you!
-
Resources to create Cyber security strategy, for CISOs
Say you're a CISO or a consultant helping a CISO to create a cyber security strategy Do you have any good resources? frameworks? industry standards/benchmarks? keen to hear your thoughts and I'll share mine as well!
-
Sony Entertainment Pictures 2014
Hello, I am working on a case study on SEPs 2014 cyber attack. I was wondering if you have links or resources that you would be able to share to help me have a deeper insight in the case.. Thank you
-
SPE's CIA Triad
Hi Folks, I am working on the Sony Picture Entertainment Case of 2012. In particular, I am learning about the cybersecurity strategy that companies should aim to protect the confidentiality, integrity, and availability of its information systems (AKA CIA Triad). Would like to collect your thoughts about which of these…
-
SSL and TLS
I was just curious how some of you cybergurus are dealing with the many SSL and TLS vulns on your network. There seems to be like 10-15 different kinds. Most are mediums, so, its not that pressing on trying to figure out the best method to mitigate them. BUT it still is a loophole on your network. Are you just creating…
-
Whitlisting Files vs Safelisting Users: Which is Best Practice and Why?
Hi all, So recently at work our security setup at work has been going crazy with "Lateral Movement Detected". 100% of this activity has been false positives since the alert is always triggered by Deskside/Network Support guys transferring files like printer drivers, etc to the admin share of endpoints. During our status…
-
Highest paid cybersecurity jobs
What are some of the highest paid cybersecurity jobs out there? I read that bug bounty hunters, Information Security Managers/CISO/CIO, and sales engineers make the most. Is this true? Any other careers within cyber that make a lot of money?
-
Challenges for OTT and content security
OTT platforms are gaining popularity like never before, but their security is so vulnerable. A new movie or series releases and we see piracy, video capture etc happening immediately. I want to create a thread which list all security challenges faced by OTT players which can help others rethink tech framework during…
-
Verizon 2021 Data Breach Investigations Report (DBIR)
Available today is the Verizon 2021 Data Breach Investigations Report (DBIR). 2021 DBIR direct download link (PDF, 119 pages). 2021 DBIR Executive Summary direct download link (PDF, 19 pages)
-
DDoS Protection
DDoS protection is really required for all websites or not? please help me to know more about this.
-
What Do You Consider A Bad Reputation
Using sites like VirusTotal, IPvoid, Cisco Talos, etc, what would you all consider a "bad reputation". For instance if you keyed in a hypothetical IP address (8.9.10.12) and the results came back that it's reputation score was 3/100, however a second and a third IP check revealed 15/100 and 30/100 scores consecutively.…
-
CPE ideas for GPEN
Any ideas to get relevant CPEs for GPEN?
-
What is the actual career path of becoming network security ?
It has been a long time for me hearing too many different view about the carrer path of becoming network security
-
Lounge with no Guest network
Seriously guys, for you pentesters out there. So I ran into a lounge with no guest network. ALL their employees along with ALL the guests that come to that lounge to hangout all use the same network called Lounge10Net. Their claim to security is that they have a forced VPN policy on employee laptops. So my dumb question to…
-
SIEM data collecting
Hi all, I'm fairly new in the world of cyber security and new to this forum and i could use some professional help regarding SIEM. After doing some research i've read that SIEM uses agents for log aggregation. If i'm not mistaken, is this the case for systems with an OS like computers and servers. My question is, how does…
-
Proposing "SIEM Team 6"
How about we have a new security group called SIEM Team 6, in addition to Blue Team and Red Team. Instead of Hell Week they could go through a Shell Week, where they learn how to combat those type of threats. Assuming I don't get a ticket from the cheesy police first.....what do y'all say? Any takers? B) :D
-
OneNote vs Sharepoint. Which Is Easiest For Creating Playbook?
Thought to get a sense of which was the preference to the folks here and why.
-
Interview Question: How Would You Move Through KillChain? How Would You Defend It?
So guys, how would you answer the interview question "Walk me through how you would move through the Delivery Exploitation, Installation, C2, and Actions On Objectives phases of the cyber kill chain as well as how to prevent yourself from using those techniques".
-
Hacker games for Cybersecurity learning
Seems you are a day behind - March 15- 26, 2021, they have prizes to win! https://www.veracode.com/events/hacker-games
-
Besides NIST 800-86 and D4I is their another known Framework for Forensics
Hi guys. Besides the NIST 800-86 and D4I is there another well-known framework for implementing digital forensics in an enterprise organization? I added links to both forensics frameworks below. NIST 800 - 86 Guide to Integrating Forensic Techniques into Incident Response D4I Digital Forensics Framework For Reviewing and…
-
how to get in I.T Security
I recently passed Security+ and CySa but I don't experience in those field, But I have 8 years of I.T from Helpdesk to desktop support to and been I.T Admin with O365 and working in AD for 3.5 yrs. what is best route to get into security. I like to volunteer do hep company with security as part-time?
-
Azure Sentinel use cases
Hey guys My SecOps team has an item in their current sprint for developing a use case for detecting an active attacker. Does anyone have any good links to share that I can forward to them? Thanks in advance!
-
Incident Response Frameworks
The two frameworks below are the holy grail that IR jedi-masters use to implement incident response programs for organizations. For those of y'all that have used them what do y'all think? Did they meet the task, too comprehensive? they out of date? ....or just right? - ISO 27035:2011 Information Security Incident…
-
Udacity - Free Intro Python Course
https://classroom.udacity.com/me I find this to be a nice primer and intro if you are starting from ground zero. My background, SQL, and VB. Almost 0 Python, however, I really love the versatility of this language. Sourcing from API's and managing data files, etc... Apologies if this has been posted already, but I really…
-
FREE Automate the Boring Stuff with Python Udemy course
Free for the next few days, that is. Posted on Twitter by the author of the book: https://www.udemy.com/course/automate/?couponCode=JAN2020FREE You can also read the book for free on the author's website: https://automatetheboringstuff.com/
-
GWAPT
I am going to take GWAPT exam, does anyone has extra practise exam to give away? any tips to pass the exam? Thanks, Jen
-
developing a critical incident response
Bankers Association would like to implement a Critical incident response infrastructure
(BBA CSIRT) that will enable the association to collect and analyze Cyber Threat data and use this
intelligence to alert their members of evolving or existing threats, incidents and vulnerabilities
and advice on mitigation steps or best…
-
Python projects on Covid-19 analysis
I wanna know some ideas to develop project in covid-19 prediction using ML in Python. Any suggestions??
-
SPLUNK Enterprise Security: What's The Best Online Resource To Learn Implementation/Configuration?
Hi guys. SPLUNK Enterprise Security is wayyy too much in demand not to learn it's Implementation & Configuration. What do you think is the best online video resource to learn this skill to the point that you master the implementation and configuration for different sized organizations?
-
Avoid Microsoft Office 365 account from being hacked - Is 2FA sufficient?
Hi guys, I am not a cyber security expert, but I am using Microsoft Office 365 OneDrive to save some databases that I am using for customer management. The information on it is not sensitive, but still, I want to be responsible with this data. I just received an advice from the developer I work with that I should use 2FA…
-
Defanging IP Addresses 10[.]10.10.1
There's a co-worker of mine that's paranoid about defanging IP addresses. That is, of course, writing them as 10[.]10.10.1 instead of 10.10.10.1 to prevent people from clicking on it in case the link is malicious. Seriously, in my 20 years of IT I have never once seen an IP address that was clickable. Can anybody explain…
-
Affordable Software For Security Assessments
Hello all, Do any of you more experienced folks know where to find affordable software for use in security compliance assessments for areas listed below: * HIPAA/HITECH * 800-115 * PCI DSS * FedRAMP * 800-53 * 800-171 * 800-66 * NIST CSF * ISO 27001 If I were to pick one that I'm absolutely looking for it's the…
-
List Of Fees For Compliance Violations
Hi y'all, For the compliance folks with the knowledge is there a place where you can view or download a master list of the fines/fees issued for non-compliance of the various compliance requirements (e.g. PCI, HIPAA). Something like below: Fine for PCI Non-Compliance: $5,000 to $100,000 (max $500,000) Fine for HIPAA…
-
PHISHING WITH EVILGINX2 AND DNSCHEF. HELP
I have a pen test lab setup and I want to create my own DNS server which will replace the router's original DNS servers. I want all internet traffic to pass through my evil DNS as usual, but redirect specified sites to my evilginx2 phishing page. How would I go about setting this up? Here is my current setup: Evilginx2…
-
Powershell Child Item Question
When using get-childitem is there a way to upper case the selected results . so for my example I'm returning the file name , I want to convert just the results of the below to uppercase as some files are in mixed case Get-ChildItem "D:\*.*" -Recurse|select Name
-
PearsonVue Online Exam Issues - Assistance Needed
Hello TE community: I attempted to take my 70-742 at home using online proctoring on 1/13 and 1/15. Both times, my system passed the checks and I was able to take the one question sample exam. At test time, I disabled my VPN and Norton Security. When the exam was to start, on both occasions, the proctor would come on and…
-
Hidden message in unknow file (type)
Hello. I've got a file with an message in it and I need some ideas how can I found/extract the message. The file seems to be a GIF file after running on virustotal.com. I tried some Linux steganography tool and conversion from GIF to other pictures formats or Base64 and to text but no luck. I'm kind of stuck and any ideas…
-
MBA, choose a school / value
Hello colleagues!I have a somewhat unusual question ...How much will an MBA diploma from this business school be valued in the US? Name of School: Institute of Business Studies (IBS-Moscow). Site: eng-ibda.ranepa dot ru A brief summary of the school: the program accredited by AMBA and NACBME, the school has AACSB…
-
Recommended Certifications
Hey guys so I'm currently in my masters studying data analytics and graduated from my undergrad in Computer Forensics and Cyber Security. After I graduated, Covid messed some things up and the job market definitely took a hit (UK summer time) so I told myself instead of waiting around to see if I could find a job I would…
-
Building A New Cybersecurity Program From Ground Up
Hi y'all, For you folks that have done this before (or know of people that have done it) what is the most effective or easiest resource to build a cybersecurity program from the ground up specifically for a company with less than 1000 employees. If you know of an effective resource that applies to companies of all sizes…
-
Building USB pentesting devices
Hello folks, Does InfoSec already have a tool for this? I am looking to build USB pentesting devices for my company. Just looking for a script to pit on a flash drive that would send me an email that the device has been inserted. I presume I am going to lose half of these devices and don't feel like paying $45 each for…
-
SolarWinds incident response: Live demo from the trenches
It’s been a busy week for cybersecurity professionals as they respond to the SolarWinds breach. On December 13, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to immediately “disconnect or power down SolarWinds Orion products" as they were being actively exploited by malicious…
-
Cybersecurity Weekly: SolarWinds backdoor found, affects Microsoft and VMWare
A new SUPERNOVA backdoor found in SolarWinds cyberattack analysis. Microsoft says its systems were also breached in the SolarWinds hack. VMware is the latest to confirm breach in SolarWinds hacking campaign. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. New SUPERNOVA backdoor found in SolarWinds…
-
Use of open-source software for the IR needs
For those using free/open-source software for your IR needs (e.g., Kibana/Lens, QRadar, Splunk, etc.), how effective was it for you? We're a small organization (~20 head count) and considering implementing one. We're primarily offering outsourcing services to financial institutions, but simply don't have the resources to…
-
IPS Security Incident Response Process
Hi Im writing a process for responding to IPS security alerts. Does anyone know if there is any guidelines or official for standard for this. Something aligned with NIST would be good. Cisco have PSIRT but thats more to do with how Cisco respond to alerts by the look of it and I think its bit more in depth than what I…
-
Incident Response Business?
I have been approached by a friend about a possible business venture in strictly incident response and disaster recovery. I have always looked at these items as necessary business operations, but never as an actual provider of these services for a business. The more we got to talking the more I realized that in my…
-
Any Laws Against Hiring Foreign Virtual Workers For Cyber Security
Hi all. I was trying to find out if anybody knew of any laws that disallows foreign virtual workers (e.g. from Brazil, Kenya, Africa, etc) from performing cyber security audits or risk assessments for businesses here in the U.S.? This thought struck me as their is a well-known shortage for qualified cyber security workers…
-
INE eLearnSecurity Certified Threat Hunting Professional - eCTHPv2 Passed
I recently got the pass on the eCTHPv2 exam from elearnsecurity. Brief summary: Experience at time of test: 5 years security, 10 network engineer with network security Time spent studying: 3 months Purchase: Elite Bundle with 120hrs of lab, 56 hours used for lab Additional reading: Yes... a lot. Cert attempts: 2 Course:…
-
Wappalyzer technology discovery browser plugin
Does anybody use the Wappalyzer browser plugin for website technology discovery? https://www.wappalyzer.com/ Have you found it to be accurate? Do you prefer another tool? Builtwith is good, but it works only on external sites (no intranet). Wappalyzer works both internally and externally.
-
Verizon 2020 Cyber-Espionage Report (CER)
For those interested in espionage with a cyber twist: Verizon 2020 Cyber-Espionage Report (CER)
-
CrowdSec, an open-source, modernized & collaborative fail2ban for free
Dear estimated community, We would like to introduce a new security project, CrowdSec, and most importantly collect your feedback & comments. The solution is available on GitHub and will remain open-source (MIT license) and free of charge. CrowdSec is a hybrid security engine leveraging 2 different capabilities to protect…
-
endpoint Security Compliance
It is very difficult to manage and secure endpoints and
reduce cyber threats; for IT and security teams, also it is complex to make
sure continuous compliance. What is the best compliance solution to address these
issues or these challenges? Or has anybody from you come across a good endpoint security compliance solution?
-
Which security certification to do
Guys if these are the job requirements , which security certification should i do . Develop, implement and maintain security governance, including but not restricted to security frameworks, policies and standards
Third Party Risk Management, Incident Response Plans, IS18 Assessments, ISMS creation, Business Impact…
-
Red Team Assessment
What are the key points that should be discussed and asked suppliers to confirm if their approach towards Red Team assessment is the most suitable one?
-
Cryptography & Network security
What are symmetric cipher models for cryptography and network security?
-
OpenVPN GUI Connection issue
I have installed and imported the configuration file. It is not connecting. It says "connecting to management interface failed" While I checked the log I got below :smile: 2020-10-29 13:47:07 NOTE: --user option is not implemented on Windows 2020-10-29 13:47:07 NOTE: --group option is not implemented on Windows 2020-10-29…
-
Cybersecurity Weekly: Chrome zero-day, Robin Hood hackers, privacy risks
A new Chrome zero-day is under active attacks. Robin Hood hackers donate stolen Bitcoin to charity. Privacy risks are being caused by link previews in messaging apps. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. New Chrome zero-day under active attacks Google released Chrome version 86.0.4240.111…
-
Cloud
Security is what everyone is looking for- How is it possible to maintain secure operations across clouds?
-
Shadow IT
What are the shadow IT risks that every business organization should know?
-
Network Security
What points should be considered while selecting a network visibility provider?
-
Volunteer roles (in Non for profits or community centres), have you done it?
Have you volunteered in an IT role before? I'm thinking of volunteering to get more exposure and to network Anyone have any experience in this?
-
Compliance - On-premise system vs. Cloud system
What would be the key differences between On-premise system vs. Cloud system when it comes to meeting security compliance requirements? For on-premise, it is simple. Perform the test. But what if data resides in cloud? I can think of two ways... 1) Obtain audit report and rely on auditor's opinion or, 2) Physically visit…
-
Penetration Testing
How is penetration testing related to risk assessment?
-
Center for Internet Security (CIS) Membership Benefits
Hi, I'm taking a long shot and asking if anyone here is a CIS member, and what tools and resources are made available once you join? Here is some context; We are busy building a competency in our organization that will focus primarily on getting assessments done against common frameworks and benchmarks such as NSF and CIS.…
-
Cybersecurity Weekly: Apple flaws, Azure vulnerabilities, hackers buying network access
Fifty-five new security flaws were reported in Apple software and services. Researchers find vulnerabilities in Microsoft Azure cloud service. Security staff are being forced to upskill in their own time. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. Fifty-five new security flaws reported in Apple…
-
Which one - so many to pick from
So, I am debating which one of these training providers to use...I should probably do them all (to be proficient)...Below is a list of ones that I am thinking about starting to invest in. What are your favorites? Pros/Cons? I've been currently been working in Vulnerability Management for over 4yrs & in IT for over…
-
firewall configuration
Point of sale configures firewall automatically for you when a firewall blocks the connection between client and server, here manual configuration
is necessary. So if security programs block QuickBooks desktop point of sale
ports which processes get interrupted?
-
Passed CRISC / Home online proctored exam
Got my score today passed with 570 score. The passing score is 450 or higher... What I used to study: - ISACA Q & A database. ISACA recommends you have an average score of 80% and above in the Q&A before you take the exam. When I started with the Q&A my average score was 70ish% then it slowly climbed up, by the time I…
-
Thick client application
What is
the best way to do security testing for a thick client application?
-
Vulnerability management
What is enterprise vulnerability management? Why is it important to renew a vulnerability management program for enterprises?
-
NGFW -- is it strictly for enterprise networks only??
Do you have/use Next Gen Firewall at home? or only at work? I was curious which brand do you prefer over the others. I was thinking about getting one for the house with wireless included. I am thinking the most affordable ones would be the Fortinet & Sonicwalls (according to the first link below). I know majority of these…
-
Java vs. Python - which one is easier for beginners?
I'm getting a programming assignment at work soon that will necessitate my learning either Java or Python - I have the flexibility to choose which language I'd like to use. I have no experience with "real" programming - all of the programming I've done thus far has been in VBA, SQL, SAS, and R. I'd obviously like to get up…
-
Looking for advice
I’ve been a windows admin for almost 20 years. I passed my MCSA years ago for the 2003 track and also have my A+ and NET+ and recently passed my CCNA. I also work for a MSP and I’ve recently been involved and auditing clients and getting them compatible for HIPPA and NIST Now I want to get into security and I’m debating…
-
Favorite tools for web app penetration testing
Hey, new forum! What are your favorite tools for web app penetration testing? If I was limited to one tool, I'd choose Burp.
-
Mobile Application Penetration Testing
I'm wondering if anyone that has experience with mobile app pen testing can assist me. Just for some background. I do web application pen testing with no background in pen testing mobile apps, but due to a security flaw in our android tablets that we produce, my company is wanting me to start pen testing our tablets as…
-
Cybersecurity Weekly: Social media phish, Polish hackers busted, Fortinet vulnerability
Phishing attacks target social network accounts. Polish police shut down a major group of hackers in the country. Fortinet VPN with default settings leaves 200,000 businesses open to hackers. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. Phishing attacks target social network accounts Scammers are…
-
Pros and Cons of Different Areas in Cybersecurity
What do you all think the pros and cons of the following cybersecurity areas: - Incident Response - Forensics - Governance - Audits - Penetration Testing - Analytics Do you think any of the areas has an advantage over the other and why?
-
Opensource Sandboxes
Hi there, *Please let me know if this is not the correct Topic to post this.* Can anyone help to provide opensource security sandboxes that is segregated from the network to use in opening malicious files or deep malware analysis? Has virtualization/container functionality will be good to know. Sample is: joesecurity .org…
-
Experience in cloud security
What is The Packaging of Hybrid Cloud? What are the two main types of packaged hybrid cloud?
-
AWS IoT and Security
Is anyone actively using AWS for IoT control and security? AWS looks like a great platform for IoT. There is also quite an AWS security operations infrastructure that applies to IoT hosts too. I'm also giddy about how AWS is extending this same concept to small (personal) orbital satellites. EC2 in space!
-
What is the best archive repair tool out there
Hey everyone, I trust you are all well and keeping safe. Can you please advise me on what is the best Repair tool to open an corrupted archive that I compressed using WinZip, I have downloaded 7zip but it is still giving me errors it is now coming up with an error message "cannot open the file as 7z archive is not archive"…
-
Cybersecurity Weekly: Instagram phishing scam, hackers pose as journalists, QakBot banking trojan
An Instagram Help Center phishing scam is stealing credentials. Hackers pose as journalists to trick victims into installing malware. QakBot banking trojan returned with new tricks to steal money. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. Instagram Help Center phishing scam stealing credentials…
-
Which password manager do you recommend for personal use? (Mac user)
What do you recommend and why?
-
From Law to CyberSecurity
Hi guys! I have a bachelor degree in law, with a specialization about the data breach in the General Data Protection Regulation. Since the job market in legal profession is completely saturated, o would like to specialize in a cybersec path! The topics i like more are Incident Hadlling/Response or Digital Forensics, closer…
-
Cybersecurity Weekly: Capital One fined, Qualcomm bugs, HaveIBeenPwned open sourced
Capital One fined for 2019 data breach affecting 106 million users. Nearly 50% of all smartphones affected by Qualcomm Snapdragon bugs. Have I Been Pwned code base goes open source. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. Capital One fined for 2019 data breach affecting 106 million users A…
-
Anyone used Flashpoint? (Intelligence)
I'm reading about the product and want to assess it for a potential client. keen to here if anyone used it, what did you like/didn't like about it
-
Cybersecurity Weekly: Industrial VPN flaws, Zoom bug, New side-channel attacks
Industrial VPN flaws let attackers target critical infrastructures. A new Zoom bug allowed snoopers to crack private meeting passwords in minutes. A new attack leverages HTTP/2 for effective remote timing side-channel leaks. All this, and more, in this week’s edition of Cybersecurity Weekly. 1. Industrial VPN flaws let…
-
Pentester Academy
So I signed up for Pentester academy I'm going through some of the videos (slowly). I want to know how did you use Pentester academy? did you view the videos first then went to the attackdefense labs? or did you just use the labs? The labs don't seem to correlate directly to the vidoes / they seem to be independent…