Multiple ransomware groups that have been accumulating access and maintaining persistence on target networks for several months activated dozens of ransomware deployments in the first two ...
Guardicore's open source breach and attack simulation platform Infection Monkey now maps its attack results to the MITRE ATT&CK framework, allowing users to quickly discover internal ...
Three things your company should do to protect credentials during the coronavirus pandemic.
From lack of planning to rushing the closure of incidents, these mistakes seriously harm IR effectiveness.
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
This is a joint webcast from Black Hills Information Security and Active Countermeasures. How many of us have tried some new configuration option, utility, or hardware on a production ...
In today's economic climate, CISOs have to make every penny count and maximize every dollar. Here’s how some do that.
A Python library to help with some common threat hunting data analysis operations - target/huntlib