top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?


CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
abdelsyfane
May 30, 20222 min read
Â
Â
Â


If You Use the Same Passwords for Every Thing, CHANGE THEM NOW!
Author Eric Tsang After analyzing password attacks using my honeypot, one easy thing you can do to protect yourself is to have strong...
abdelsyfane
May 2, 20225 min read
Â
Â
Â


Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
This was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
abdelsyfane
Apr 4, 20226 min read
Â
Â
Â


Let’s Talk About Windows Drivers
Author John Neff Another day, another Windows driver vulnerability. Cyber Security professionals found their Windows networks...
abdelsyfane
Aug 9, 20216 min read
Â
Â
Â


More Fun with MITRE ATT&CK Navigator and NIST SP 800-53
Part 2 Author Elaine Harrison-Neukirch In part 1 of Fun with MITRE ATT&CK Navigator and NIST SP 800-53, I introduced MITRE ATT&CK, ATT&CK...
abdelsyfane
Jul 12, 20214 min read
Â
Â
Â


Fun with MITRE ATT&CK Navigator and NIST SP 800-53
Part 1 of a 2 part blog Author Elaine Harrison-Neukirch I recently left the Security Analyst world and now work in the Adversary...
abdelsyfane
Jun 14, 20213 min read
Â
Â
Â


CyberChef – Data decoding made easy
Author Kevin Kipp A SOC Analysts’ job can sometimes seem overwhelming. There is a myriad of obfuscation techniques that adversaries can...
Emily Stamm
May 31, 20215 min read
Â
Â
Â


Build Your Own Home Cyber Range: Part 1
This article originally appeared on Code Fellows with the title "Build Your Own Home Cyber Range: Part 1" Author David Lee Ever wondered...
Emily Stamm
May 3, 20215 min read
Â
Â
Â


Using OSINT Reconnaissance to Protect Your Organization
Author Britton White Open Source Intelligence (OSINT) reconnaissance involves using publicly available resources to passively gather...
Emily Stamm
Feb 15, 20213 min read
Â
Â
Â


Digital Document Signing Laws: an Overview
This article originally appeared on SSL.com with the title Digital Document Signing Laws: A Global View Author: Connor Wilson If the...
Emily Stamm
Feb 4, 20215 min read
Â
Â
Â


Why You Should Embrace Purple Team Today
Introducing Purple Teaming Author Jorge Orchilles Wait, wait, wait, are you introducing us to another color in information security? Yes...
Emily Stamm
Feb 1, 20213 min read
Â
Â
Â


Skim Hacks: What They Are and How to Defend Against Them
Author: Jen Stone With so much critical information available online, malicious actors have found increasingly insidious (and automated)...
Emily Stamm
Jan 25, 20214 min read
Â
Â
Â


BEWARE the SOCK PUPPET! An OSINT Technique in Social Engineering
Author Reynaldo Gonzalez When we go online, it provides us the opportunity to explore, learn something new, or share moments and...
Emily Stamm
Nov 9, 20202 min read
Â
Â
Â


VLANs Are Your Friend
A Virtual Local Area Network can be simply defined as a group of devices on different LAN segments
abdelsyfane
Oct 26, 20202 min read
Â
Â
Â


What You Need To Know About Vetting
Simple and practical advice on how to vet apps and cloud services.
abdelsyfane
Jun 29, 20202 min read
Â
Â
Â


Protect Yourself From An E-Mail Scam Today
How to protect yourself from BEC (Business Email Compromise)
abdelsyfane
May 25, 20203 min read
Â
Â
Â
bottom of page
