Our book in Korean is ready (사이버 보안 )

This is an awesome feeling, finally, our award-winning book Cybersecurity Attack and Defense Strategies is ready to sale in Korean. Yuri and I are really proud, this was our first book project and even after nearly 2 years it's still in Amazon Bestselling list and now it's ready to take off in Korean. 사이버 보안 [레드팀 및 블루팀 전략] 원서명Cybersecurity - Attack [...]

A Cybersecurity Strategy for the Financial Sector

Understand the threats to financial cyberspace and learn how to implement the right strategy to secure your organization. This presentation will take you through some of the most well-known case studies and real-life threat scenarios and how to tackle them so as to protect your financial services and related infrastructure. You can watch the webinar via registering in [...]

Fix: Outlook keeps asking for a password?

If you care about your Security, then you need to take an extra step and tun on two-step verification in your account. (If you don't know how, please check this link below this article) Multi-Factor Authentication* (MFA) in your Outlook.com /Hotmail / MSN etc accounts. This will ensure that, to have an extra layer of security against hackers. But [...]

New Book: Inside the Dark Web

I am proud to announce my new book which I authored with support of Dr. Rafiqul Islam, who is a lecturer at Australian Charles Sturt University, where our book will be also used as the Core Book of ITS 578 Dark Web ( http://www.csu.edu.au/handbook/handbook19/subjects/ITC578.html ) The book is Scheduled to be released in June 10 and if [...]

Understanding the cost of a cybersecurity attack: The losses organizations face

The average cost of a cybersecurity attack has been increasing over time. The rewards to hackers in cyberheists have also been increasing, and this has been motivating them to come up with even better tools and techniques in order to allow them to steal more money and data. Several cybersecurity companies have listed their estimates for the average costs [...]

Posted By Category: GeneralComments: 0

Knowing the threat actors behind a cyber attack

This article is an excerpt taken from our latest book Hands-On Cybersecurity for Finance written by  Milad Aslaner and myself. In this book you will learn how to successfully defend your system against common cyber threats, making sure your financial services are a step ahead in terms of security. In this article, you will understand the different types of threat [...]

CARBANAK Source Code Analysis (By Fireeye)

Please be aware this is a repost from FIREEYE. Michael Bailey, James T. Bennett did a great job, which deserves respect. PART 1: https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html PART 2: https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-two-continuing-source-code-analysis.html It is very unusual for FLARE to analyze a prolifically-used, privately-developed backdoor only to later have the source code and operator tools fall into our laps. Yet this is the [...]

Posted By Category: GeneralComments: 0

Cybersecurity: The Beginner’s Guide

Cybersecurity: The Beginner's Guide More than 400 pages of a comprehensive guide to getting started in cyber + 100 pages of advice from Cybersecurity experts. You will find everything to excel your career in Cybersecurity, or help your Organization to close the Cyber Talent Gap. The book is coming soon via @Packt and Amazon Thank you very much for [...]

56 Must Know Data Breach

56 Must Know Data Breach I found this blog post by  Rob Sobers( https://www.varonis.com/blog/data-breach-statistics/ ) very informative , and I wanted to share it with YOU as well. Data breaches are getting bigger, hackers are getting savvier, and the amount of compromised data is unfortunately on the rise. A quick look at data breach trends shows that hackers are mostly motivated by money to acquire data and that personal information [...]

Posted By Category: GeneralComments: 0

Dell Latitude 7390 2-in-1 Review

The first look : It looks small and compact, touch screen , Windows 10, finger print reader , 2 in 1 capabilities seems attractive, price is OK so what else do you need , right ? WRONG Yes, it looks nice, but there are many hidden major issues you might not notice during Product review online or in store. WHY NOT THIS [...]