- Cheat Sheets IT and Cybersecurity Cheat Sheets
As much as we try to be proactive about cybersecurity, IT planning, or project management, we get distracted, or procrastinate. These cheat sheets, checklists and templates are designed to assist...
- Incident Response Digital Forensics and InfoSec Career Advice From Across the Web
A curated collection of career advice for professionals pursuing digital forensics, malware analysis, and information security. Resources cover getting started, professional development, and...
- Social Networking What Anomalies Trigger The LinkedIn Sign-In Verification Challenge?
LinkedIn presents security challenges when detecting logins from unfamiliar locations, new countries, extended absences, or suspicious activity patterns. The verification process involves email links...
- Malware Attributing Cyberattack Activities to a Group in India
Researchers attributed coordinated cyberattacks against South Asian organizations to a group operating from India based on target profiles, decoy document contents, embedded debug strings,...
- Malware Analysis Several Posts on Malware Analysis Tools
- Malware Anticipating Cyber Threats Beyond APT
Organizations that experienced APT attacks years ago may offer insights into threats that will eventually reach other companies. Predicted trends include greater use of purchased exploits,...