• Home
    • News
  • Individuals
    • Students
    • Senior Nevadans
    • Parents & Educators
  • Business
    • Small Business
    • Medium To Large Business
    • Leadership
  • Resources
  • About Us
    • Sponsors
CybersafeNV - CybersafeNV Website

Author: sowerb1


  • January 21, 2025

    ISC Stormcast For Tuesday, January 21st, 2025 https://isc.sans.edu/podcastdetail/9288, (Tue, Jan 21st)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Partial ZIP File Downloads, (Mon, Jan 20th)
    January 20, 2025

    Partial ZIP File Downloads, (Mon, Jan 20th)

    Say you want a file that is inside a huge online ZIP file (several gigabytes large). Downloading the complete ZIP file would take too long. If the HTTP server supports the range header, you can do the following: We will work with my DidierStevensSuite.zip file as an example (it’s 13MB in size, not several GBs,…

    Read More

  • January 20, 2025

    ISC Stormcast For Monday, January 20th, 2025 https://isc.sans.edu/podcastdetail/9286, (Mon, Jan 20th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • January 19, 2025

    Zero Trust and Entra ID Conditional Access, (Sun, Jan 19th)

    Microsoft Entra ID (Formerly Azure AD) Conditional Access (CA) policies are the key components to a Zero Trust strategy, as it provides the ability to function as the front door for users and devices. CA policies use attributes, or signals, of various components as variables to be used to enforce specific access controls. Attributes include…

    Read More

  • New tool: immutable.py, (Sat, Jan 18th)
    January 18, 2025

    New tool: immutable.py, (Sat, Jan 18th)

    When performing triage on a Linux system you suspect might be compromised, there are many aspects of the system that you may want to look at. In SANS FOR577, we talk about some existing tools and even writing your own bash script to collect triage data. In a case I worked a year or so…

    Read More

  • Leveraging Honeypot Data for Offensive Security Operations [Guest Diary], (Fri, Jan 17th)
    January 17, 2025

    Leveraging Honeypot Data for Offensive Security Operations [Guest Diary], (Fri, Jan 17th)

    [This is a Guest Diary by Alex Sanders, an ISC intern as part of the SANS.edu BACS program] Introduction As an offensive security professional, it is often part of my job to stand up infrastructure that is intentionally malicious and must be exposed to the internet. Examples of this could include Evilginx, Cobalt Strike, or…

    Read More

  • January 17, 2025

    ISC Stormcast For Friday, January 17th, 2025 https://isc.sans.edu/podcastdetail/9284, (Fri, Jan 17th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Extracting Practical Observations from Impractical Datasets, (Thu, Jan 16th)
    January 16, 2025

    Extracting Practical Observations from Impractical Datasets, (Thu, Jan 16th)

    [This is a Guest Diary by Curtis Dibble, an ISC intern as part of the SANS.edu BACS [1] program] Figure 1: A heatmap showing the date and frequency a given set of commands input to the honeypot Spoiler alert, sugar costs money, and syntactic sugar is the most expensive type. Fortunately, we live in an era…

    Read More

  • January 15, 2025

    Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

    Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivanti’s Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283, see Ivanti Releases Security Updates for Connect Secure, Policy Secure, and ZTA Gateways. Summary The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of…

    Read More

  • February 6, 2023

    Cybersafe NV Press Release – 9.25.2013

    Read More

←Previous Page
1 … 45 46 47

Our Sponsors

Quick Links

About Us
Individuals
Business
Resources

Contact

Twitter
Facebook
LinkedIn

Copyright © 2022 Cyber Safe NV. All Rights Reserved.