- Malware Analysis Version 7 of the REMnux Distro Is Now Available
- Privacy Unemployment Insurance Fraud and Identity Theft: Up Close and Personal
Scammers are using stolen personal information to file fraudulent unemployment claims, opening bank accounts in victims' names to receive payments. Victims typically discover the fraud when they...
- Communication How You Can Write Better Threat Reports
Writing about cybersecurity threats requires deciding what details to include, demonstrating sound analysis, and addressing multiple audiences. A rating sheet checklist can help ensure threat reports...
- Malware Analysis Learning Malware Analysis and Cybersecurity Writing Online
- Tools How to Set Up a SpiderFoot Server for OSINT Research
SpiderFoot automates OSINT collection from numerous data sources, including Shodan and Have I Been Pwned, to gather intelligence about IPs, domains, and email addresses. Running the free, open source...
- Leadership What's It Like for a New CISO?
Transitioning into a CISO role involves forming an information security program, justifying cybersecurity purchases with business-relevant details, and addressing practical challenges like enabling...