At its core, a CTF is both a learning tool and a game, making it a fun and interactive way to dive into cybersecurity, whether you’re a beginner or a seasoned professional. CTFs usually come in three categories: Jeopardy-style, Attack-defense, and Mixed or King of the Hill.
Category: InfoSec News
InfoSec News
Russian group’s hack of Texas water system underscores critical OT cyber threats | CSO Online
But water systems have been increasingly in the crosshairs in 2024, resulting in the following noteworthy water security developments:
JPCERT shares Windows Event Log tips to detect ransomware attacks
The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.
How to manage shadow IT and reduce your attack surface
There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/
Top 10 Open-Source Intelligence Tools (OSINT)
OSINT tools help access, collate, and organize relevant data based on queries within the various tools. Organizations wanting to develop an OSINT practice should consider what approach they should take when leveraging these tools.
Microsoft warns of ransomware attacks on US healthcare | CSO Online
The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.
6 things hackers know that they don’t want security pros to know that they know | CSO Online
“Hackers know that the average CISO has a lot on their plates and they don’t have enough [resources] to get everything done.
Unpatchable 0-day in surveillance cam is being exploited to install Mirai | Ars Technica
Akamai said that the attackers are exploiting the vulnerability so they can install a variant of Mirai, which arrived in September 2016 when a botnet of infected devices took down cybersecurity news site Krebs on Security.