Cyber Story Time: The Boy Who Cried “Secure!”

November 21, 2024 at 07:15AM Automated Security Validation (ASV) tools provide continuous real-time assessments of cybersecurity defenses. Unlike vulnerability scanners, ASVs validate fixes against threats, preventing false negatives. This article underscores the importance of ASVs in identifying security gaps through real-time testing, illustrated by the fable of “The Boy Who Cried Wolf.” ### Meeting Takeaways: … Read more

Russian Ransomware Gangs on the Hunt for Pen Testers

November 19, 2024 at 01:57PM Ransomware gangs like Apos, Lynx, and Rabbit Hole are recruiting pen testers to enhance their operations, reflecting the professionalization of Russian cybercrime. A Cato Networks report highlights the growing threat of ransomware, unauthorized AI, and underutilization of Transport Layer Security (TLS) in cybersecurity practices. ### Meeting Takeaways 1. **Ransomware Gangs … Read more

Join in the festive cybersecurity fun

November 19, 2024 at 04:16AM The 2024 SANS Holiday Hack Challenge, starting on November 7, features eight weeks of gamified cyber exercises. Participants can tackle various challenges across skill levels, with a live scoreboard for tracking progress. Winners receive prizes like free courses and subscriptions. Sign up for updates and further details online. ### Meeting … Read more

Beyond Compliance: The Advantage of Year-Round Network Pen Testing

November 18, 2024 at 06:03AM IT leaders are urged to conduct more frequent network penetration testing to stay ahead of hackers, as compliance-focused approaches are insufficient. Automated testing solutions like vPenTest can reduce costs by over 60%, allowing companies to perform assessments quickly, maintain security year-round, and meet regulatory and insurance requirements efficiently. ### Meeting … Read more

How Playing Cyber Games Can Help You Get Hired

November 6, 2024 at 10:01PM Cyber gaming experience can enhance job candidates’ appeal by showcasing technical proficiency, teamwork, and problem-solving skills. Participants gain real-world skills in a safe environment, improve soft skills, and may attract job opportunities from sponsors. This experience provides applicants with unique credentials, setting them apart in the competitive job market. ### … Read more

Guide:  The Ultimate Pentest Checklist for Full-Stack Security

October 21, 2024 at 08:24AM Pentest checklists are crucial for thorough security assessments as they help identify vulnerabilities systematically across various assets. Tailored for specific characteristics, these checklists enhance penetration testing efficiency and effectiveness, ensuring comprehensive coverage. BreachLock offers guides covering checklists for networks, applications, APIs, mobile, wireless, and social engineering. ### Meeting Takeaways: Penetration … Read more

Trump campaign arms up with ‘unhackable’ phones after Iranian intrusion

October 14, 2024 at 10:35AM With less than a month until the presidential election, the Trump campaign is investing in secure technology from Green Hills Software to prevent hacking. This includes unhackable phones and computers using the high-security Integrity-178B operating system, aimed at ensuring election integrity amid concerns over previous intrusions. ### Meeting Takeaways: 1. … Read more

How to Plan and Prepare for Penetration Testing

September 27, 2024 at 07:30AM The advancing security technology is matched by adversaries implementing new techniques to enhance speed and impact while evading detection. Ransomware and malware remain prominent tools for cyber criminals, with hands-on intrusion techniques posing a threat. To manage risks, security practitioners seek penetration testing services, which involve detailed planning and preparation. … Read more

Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

September 25, 2024 at 10:21AM Cybersecurity researchers discovered a new post-exploitation tool, Splinter, with features commonly found in penetration testing tools, developed in Rust. While not as advanced as others, it poses a threat if misused. No threat actor activity has been detected, but its large size suggests potential for cloud and data compromise. This … Read more

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town

September 23, 2024 at 02:51AM Attackers are using a new post-exploitation tool called Splinter to infiltrate and disrupt victims’ IT environments. The malicious tool can execute Windows commands, steal files, collect cloud service account info, and download additional malware. Unlike Cobalt Strike, Splinter poses a potential threat to organizations and remains undetected on victims’ networks. … Read more