The Equifax Breach, the Dark Web, and the Power of Lifetime Data by Emily W. @ Terbium Labs (http://www.terbiumlabs.com). Terbium Labs explained the compromised data on the Dark Web, the huge impact and what people should expect over time due to the Equifax breach. http://www.ow.ly/lvpZ30f8LDy
Hi Friends! Definitely the bad guys are not going to stop. As you may know, Equifax (a consumer credit reporting agency), was hacked and our personal information unfortunately was compromised. What can we do?… The following link, by SANS Security Awareness, will provide valuable tips and information. https://securingthehuman.sans.org/blog/2017/09/08/awareness-officers-what-to-communicate-about-the-equifax-hack
There’s a SANS training called Hacker Tools, Techniques, Exploits, and Incident Handling in Columbus, Ohio!!! Don’t miss the opportunity to register! You can find more information about this training and others at: https://www.sans.org/community/event/sec504-columbus-50745
I passed the GIAC Information Security Fundamentals certification!!! GISF
https://www.paloaltonetworks.com/company/press/2017/palo-alto-networks-and-girl-scouts-of-the-usa-announce-collaboration-for-first-ever-national-cybersecurity-badges Palo Alto Networks will collaborate with the Girl Scouts to deliver Girl Scout Cybersecurity badges throughout the United States.
According to Keith Palmgren (Senior SANS Instructor), Brute Force attack simply guesses every possible crypto key until eventually one of them work. In other words, it doesn’t matter if it’s today or in the future the Brute Force attack will ALWAYS work. Are we ready to fight this attack?
Start by using good passwords. 15 character passwords are better than 8 character passwords. The longer the password you use the more secure you’ll feel by delaying a Brute Force attack.
According to Unit 42 (Palo Alto Networks) a new variant of the Petya malware is spreading over the Microsoft Windows SMB protocol and is impacting organizations in Ukraine and other parts of Europe. Stay up to date and to know more about Petya ransomware go to https://researchcenter.paloaltonetworks.com
https://www.checkpoint.com/defense/advisories/public/2017/cpai-2017-0527.html Check Point talks about the 3 ‘Most Wanted’ malware as well as the 3 “Most Wanted’ mobile malware. Check Point provides details about how they are spread and used. Press releases published in June 20, 2017.
Stay up to date with Check Point. Go to: https://www.checkpoint.com/defense/advisories/public/2017