Article: Apple to Continue Using Qualcomm Modem Chips for 2023 iPhone 15 Models - published about 2 years ago. Content: https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/ Published: 2022 11 02 21:14:19 Received: 2022 11 02 21:45:36 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
Article: Apple to Continue Use Qualcomm Modem Chips for 2023 iPhone 15 Models - published about 2 years ago. Content: https://www.macrumors.com/2022/11/02/apple-qualcomm-modem-chips-iphone-15/ Published: 2022 11 02 21:14:19 Received: 2022 11 02 21:25:11 Feed: MacRumors : Mac News and Rumors Source: MacRumors : Mac News and Rumors Category: News Topic: Cyber Security |
|
Article: Steampipe: Getting Started. Using AWS, Github and Docker plugins - published about 2 years ago. Content: submitted by /u/stevecio [link] [comments] https://www.reddit.com/r/netsec/comments/ykhlgv/steampipe_getting_started_using_aws_github_and/ Published: 2022 11 02 21:11:53 Received: 2022 11 02 21:22:36 Feed: /r/netsec - Information Security News and Discussion Source: /r/netsec - Information Security News and Discussion Category: Cyber Security Topic: Cyber Security |
|
Article: Top 10 Cybersecurity Writing Mistakes - published about 5 years ago. Content: Want to strengthen your writing in under an hour? Watch the video I recorded to help you avoid the top 10 writing mistakes I've encountered when working as a cybersecurity professional. The mistakes you'll see in this video—and the practical tips for avoiding them—span the key aspects of technical writing: structure, look, words, tone, and informat... https://zeltser.com/cybersecurity-writing-mistakes/ Published: 2019 10 05 01:00:36 Received: 2022 11 02 21:04:34 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: What’s It Like for a New CISO? - published almost 5 years ago. Content: As of this writing, I've spent six months in the role of Chief Information Security Officer (CISO) at Axonius, a rapidly growing technology company. Though I've held a variety of leadership positions over the years, working in this capacity and setting is new for me. I've been capturing aspects of my journey in talks and articles so that others might learn ... https://zeltser.com/new-ciso-impressions/ Published: 2020 02 13 16:38:59 Received: 2022 11 02 21:04:34 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: How to Set Up a SpiderFoot Server for OSINT Research - published over 4 years ago. Content: SpiderFoot is a tool for gathering Open Source Intelligence (OSINT) and threat intelligence about IPs, domains, e-mail addresses, and other research targets from many data sources, including services such as Shodan and Have I Been Pwned. Steve Micallef, the tool's author, offers a free, open source version of SpiderFoot. His team also provides an affordable... https://zeltser.com/spiderfoot-server-setup/ Published: 2020 04 17 01:10:28 Received: 2022 11 02 21:04:34 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: Learning Malware Analysis and Cybersecurity Writing Online - published over 4 years ago. Content: You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. You'll like this if you prefer to start, stop, or speed up training any time they want or who need the flexib... https://zeltser.com/malware-analysis-and-writing-online-training/ Published: 2020 04 20 03:31:40 Received: 2022 11 02 21:04:34 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: How You Can Write Better Threat Reports - published over 4 years ago. Content: Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. How should you decide what details to include? How can you persuade the readers that your analysis is sound? How might you address the needs of multiple audiences? I'm happy to share what I've learned over the years abo... https://zeltser.com/write-better-threat-reports/ Published: 2020 07 01 13:42:51 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: Unemployment Insurance Fraud and Identity Theft: Up Close and Personal - published over 4 years ago. Content: In June 2020, the Federal Trade Commission (FTC) warned that "imposters are filing claims for unemployment benefits [in the US], using the names and personal information of people who have not filed claims." How do such scams look from the victim's perspective, and what can you do if you're affected? As a victim of this scheme, I'd like to share my experien... https://zeltser.com/unemployment-fraud-and-identity-theft/ Published: 2020 07 02 03:24:04 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: Version 7 of the REMnux Distro Is Now Available - published over 4 years ago. Content: 10 years after the initial release of REMnux, I'm thrilled to announce that REMnux version 7 is now available. This Linux distribution for malware analysis includes hundreds of new and classic tools for examining executables, documents, scripts, and other forms of malicious code. To start using REMnux v7, you can: Download REMnux as a virtual applianc... https://zeltser.com/remnux-v7-release/ Published: 2020 07 22 13:51:50 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: REMnux Tools List for Malware Analysis - published about 4 years ago. Content: REMnux® offers a curated collection of free tools for reverse-engineering or otherwise analyzing malicious software. How to find the right tool for the job, given how many useful utilities come as part of the distro? To guide you through the process of examining malware, REMnux documentation lists the installed tools by category. Each grouping, which you... https://zeltser.com/remnux-tools-list/ Published: 2020 10 13 16:14:40 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: How You Can Start Learning Malware Analysis - published almost 4 years ago. Content: Malware analysis sits at the intersection of incident response, forensics, system and network administration, security monitoring, and software engineering. You can get into this field by building upon your existing skills in any of these disciplines. As someone who's helped thousands of security professionals learn how to analyze malware at SANS Institute,... https://zeltser.com/start-learning-malware-analysis/ Published: 2021 01 06 16:09:04 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
|
Article: How to Ask Questions to Succeed with Security Projects - published about 3 years ago. Content: No matter the years of experience in cybersecurity, security professionals are often in situations where crucial details are missing. Yet, we often hesitate to ask questions because we don't want to appear ignorant or don't know what to ask. I captured my perspective on asking questions in a constructive way in a three-post series. Read the posts to lear... https://zeltser.com/how-to-ask-questions-to-succeed-with-security-projects/ Published: 2021 10 14 14:53:00 Received: 2022 11 02 21:04:33 Feed: Lenny Zeltser Source: Lenny Zeltser Category: Cyber Security Topic: Cyber Security |
Article: US Treasury thwarts DDoS attack from Russian Killnet group - published about 2 years ago. Content: https://go.theregister.com/feed/www.theregister.com/2022/11/02/killnet_us_treasury_ddos/ Published: 2022 11 02 20:45:13 Received: 2022 11 02 21:04:19 Feed: The Register - Security Source: The Register - Security Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor