CYBERSECURITY CERTIFICATIONS -1

Dear Readers 🙏, The Demand for Cyber Security Professionals Is Strong.  Whether you’re just starting off in the cyber-security field or are already working as a security professional, there are many certifications for you to consider across various specializations and difficulty levels. Before jumping to the certifications let’s having look of cyber security mind-map: Top…

WHY OPEN SOURCE THREAT INTELLIGENCE

A file hash is smoking gun for forensic investigators, Break Down the Open Source Intelligence Knowledge Stack Other sites dedicated to compiling information about indicators from the atomic to the behavioral include: Team Cymru’s Community Services portal: This portal includes IP reputation lookup and malware hash analysis. Threatminer: Search by domains, hashes, user-agent strings and…

CYBER THREAT INTELLIGENCE PLATFORMS (TIPS)

ENISA has released the first comprehensive study on Cyber Threat Intelligence Platforms (TIPs) focused on the needs of TIP users, developers, vendors, and the security research community. So lets brief, what is Threat intelligence platform : Threat Intelligence Platform (TIP) is an emerging technology discipline that helps organizations aggregate, correlate, and analyze threat data from multiple sources in real…

EQUIFAX DATA BREACH

Equifax Hackers Demanding $2.6 Mln in Bitcoin, Or Else Expose 143 million Americans Private Info Equifax data breach may affect nearly half the US population. Three Equifax execs sold $1.8 million of stock days after breach discovery. But before it was made public. Equifax Inc. is a consumer credit reporting agency in the United States,…

OIL & GAS ENERGY INDUSTRIES: CYBER THREATS

Cyber Domain “Fifth Domain of Warfare” 🌍 Cyber-attacks on the energy sector, and on oil and gas facilities, have increased in the past five years along with the associated costs. The scale and severity of attacks on industrial cyber systems are growing. For the oil and gas sector – like other sectors – it continues…

CYBER SECURITY JOB CATEGORIES

High employer demand, fabulous salaries, great promotion prospects – what’s not to love about cyber security? According to data compiled by Burning Glass, postings for cyber security jobs grew 74% from 2007 to 2013 – 2x faster than other IT positions. Sure, it all sounds sexy, but any cyber security professional will tell you that…

TOP 10 SECURITY AND INTELLIGENCE STORIES OF 2016

When an Intrusion Happens, Speed Matters Here are the top stories on security & intelligence from 2016 ranked by ooda loop: #1: 10 Red Teaming Lessons Learned over 20 Years by Matt Devost #2: Best Security, Business, and Technology Books of 2016 by Matt Devost #3: The Red Teamers Top Ten Books by Mark Mateski #4:…

CYBER SECURITY THREAT 2017

Thanks you ones again to all those who read this blog and keep up with me via Facebook LinkedIn and twitter, I’m grateful for our connection. Well in this article going to focus on Cyber Security threats. As we know Ransomwares, DDOS, Mobile malware, Underground Hacking, Insider Threat are the major trending threats in few last…

WAYS TO HACK OFFLINE

Is unplugging your Internet connection enough to hide from prying eyes? Certainly Not. Just because you’re offline doesn’t mean your computer or your Smartphone can’t be hacked. Chances are high that you are one of the owners of nearly 100,000 computers around the world in which the National Security Agency has implanted software that enables…

AWESOME THREAT INTELLIGENCE

A curated list of awesome Threat Intelligence resources A concise definition of Threat Intelligence: evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard. Sources Formats Frameworks Tools Research,…

FAILURE: INDIAN CYBER-SECURITY

Does cyber security concern you? You may think not, but think twice! How secure is your data? Has the company you’ve been working for ever been hacked? Do you use public Wi-Fi? Have you backed up your data? Are you familiar with encryption? How much do you value уour data and respectively, yourself? Found an…

IDENTITY THEFT

Another LinkedIN case solved, interesting part is behind this game a girl…. —————————————- Now after facebook twitter lots of cases regarding cyber stalking, identity theft etc on “LinkedIN” LinkedIn : Alleged (GIRL) steal the identity(email, contact no.) and created a profile by same name and credentials. Process : obtain the IP address from which the…

DEEP WEB | DARK WEB

If you’re into computer security at all you may have heard of terms like “Deep Web” and “Dark Web”. The terms can be confusing so here are the basics: Summary The Internet is where everyone has access to and where it’s easy to find things because they’re indexed by search engines. The Deep Web is…

INTERNATIONAL CYBER-SECURITY

Found an interesting read sharing with you; THE VAST stores of digital information generated by everyday lives—communications data, CCTV footage, credit-card records and much more—are now yielding invaluable clues about the terrorist attacks in Paris and are helping guide the hunt for the surviving plotters. But prevention is better than cure. The attacks have highlighted…

TOP INTELLIGENCE SECURITY STORIES 2015

Hi , It has been another interesting and dynamic year on the security and intelligence front. Cyber intelligence is the tracking, analyzing and countering of digital security threats. This type of intelligence is a blend of physical espionage and defense with modern information technology. The first step to understanding cyber intelligence is to realize that…

SIEM PPRODUCT COMPARISON 2016

SIEM play important role in In the field of computer security, Security Information and Event Management (SIEM) software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by network hardware and applications.(#WiKi) When attackers compromise the perimeter or are operating from within, you…

BEHAVIORS INSIDER SPY THREATS

SIGN YOU HAVE AN INSIDER THREAT An insider spy is perhaps the most significant threat to enterprise security. Monitoring their behavior is a critical component in detecting and deterring their activities. It’s not about the 98% you catch, it’s about the 2% you miss –NSS Labs Insider Threats –  Some Statistics PWC  2015 Roughly 70%…

TYPES OF CYBER ATTACK OR THREATS

According to the Practical Law Company, Whitepaper on Cyber Attacks, the definition of Cyber Attacks is as follows: A Cyber Attack is an attack initiated from a computer against a website, computer system or individual computer (collectively, a computer) that compromises the confidentiality, integrity or availability of the computer or information stored on it. Backdoors…