562 Articles 5 Followers

New Cryptojacking Malware Breakdown

22 May 2024 1 minute read 0 comments Matthew Rosenquist

New Cryptojacking Malware Breakdown - The GhostEngine cryptocurrency mining malware disables endpoint security protections, deletes logs, modifies the kernel, and digs-in to establish persistence. It all begins with getting the victim machine to lau...

North Korea is Trying to Embed Agents into IT Positions of Western Countries

22 May 2024 1 minute read 0 comments Matthew Rosenquist

Attention IT departments, the FBI is warning US companies to be wary of inadvertently hiring North Koreans to remotely work in their IT departments, amid fears of data theft and hacking. We are seeing organized activities designed to mask the origin...

SEC Will Require Finance to Notify Breach Victims in 30 Days

20 May 2024 1 minute read 0 comments Matthew Rosenquist

More SEC rules, this time mandating financial firms inform victims of data breaches within 30 days! Why wasn't this already a requirement? Last year, the SEC instituted requirements for publicly traded companies to inform investors of material cyber...

And Security for All Podcast 2024: Cybersecurity's Major Trends & Threat Dynamics

16 May 2024 1 minute read 0 comments Matthew Rosenquist

I'm excited to be speaking live with Kim Hakim on the And Security For All podcast tomorrow to discuss 2024's Cybersecurity's Major Trends & Threat Dynamics, including the ever-changing role of a CISO and the accelerating risks of Nation State cyber...

Unlock Your Cybersecurity Career: Exclusive Discounts on Top Training Courses!

15 May 2024 1 minute read 0 comments Matthew Rosenquist

There are tremendous opportunities in cybersecurity and the industry needs many more qualified workers.  Training plays an important part.  That is why I am partnering with Infosec4TC, an online training provider that offers free courses in addition...

How to Scan QR Codes SAFELY

5 May 2024 1 minute read 7 comments Debesh Choudhury

People often warn you about QR Codes. People are correct in warning you about QR codes. QR Codes may contain malicious web links. It is the same vulnerability as the URL shorteners. You can't be sure what URL you will open!   You must NOT open a QR...

Unlocking SMB Cybersecurity: The Rise of Virtual CISOs in 2024 and Beyond

3 May 2024 2 minute read 0 comments Matthew Rosenquist

This year, virtual CISOs must begin making a difference in our industry. For the longest time, small and medium businesses (SMBs) have been abandoned by the cybersecurity industry. But, SMBs need security leaders to guide them through the maze of cy...

Ransomware: To Pay or Not to Pay?

2 May 2024 1 minute read 0 comments Matthew Rosenquist

  The Cybersecurity Vault — episode 32, with guest Ian Thornton Trump. In this episode, we discuss one of the most divisive and contentious topics in cybersecurity — should victims of ransomware be allowed to pay the cybercriminals? With the continui...

Graphical Password Security

2 May 2024 2 minute read 2 comments Debesh Choudhury

What is a password? A password is a string of keyboard characters used to verify a user's identity during the authentication process in a computational system online or offline. A password is typically used with a username and is designed to be k...

Is that website you're visiting secured??

2 May 2024 2 minute read 1 comment Cyril Osagie

Originally posted on my medium: There are different ways to detect a website that is not secured. In this article, I've outlined some of the ways a secured websi...