• Home
    • News
  • Individuals
    • Students
    • Senior Nevadans
    • Parents & Educators
  • Business
    • Small Business
    • Medium To Large Business
    • Leadership
  • Resources
  • About Us
    • Sponsors
CybersafeNV - CybersafeNV Website

Category: SANS Full Feed


  • Mass Internet Scanning from ASN 43350 [Guest Diary], (Thu, Aug 7th)
    August 7, 2025

    Mass Internet Scanning from ASN 43350 [Guest Diary], (Thu, Aug 7th)

    [This is a Guest Diary by Duncan Woosley, an ISC intern as part of the SANS.edu BACS program] During the last three months I’ve had a DShield sensor online and collecting data from a deployment in AWS. This week I did some statistical analysis of the last three months of data and found surprising result.…

    Read More

  • Do sextortion scams still work in 2025?, (Wed, Aug 6th)
    August 6, 2025

    Do sextortion scams still work in 2025?, (Wed, Aug 6th)

    Sextortion e-mails have been with us for quite a while, and these days, most security professionals tend to think of them more in terms of an “e-mail background noise” rather than as if they posed any serious threat. Given that their existence is reasonably well-known even among general public, this viewpoint would seem to be…

    Read More

  • August 6, 2025

    ISC Stormcast For Wednesday, August 6th, 2025 https://isc.sans.edu/podcastdetail/9558, (Wed, Aug 6th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Stealing Machine Keys for fun and profit (or riding the SharePoint wave), (Tue, Aug 5th)
    August 5, 2025

    Stealing Machine Keys for fun and profit (or riding the SharePoint wave), (Tue, Aug 5th)

    About 10 days ago exploits for Microsoft SharePoint (CVE-2025-53770, CVE-2025-53771) started being publicly abused – we wrote about that at here and here . The original SharePoint vulnerability is a deserialization vulnerability that allowed an attacker to execute arbitrary commands – while these could be literally anything, majority of exploits that we analyzed resulted in…

    Read More

  • August 5, 2025

    ISC Stormcast For Tuesday, August 5th, 2025 https://isc.sans.edu/podcastdetail/9556, (Tue, Aug 5th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • New Feature: Daily Trends Report, (Mon, Aug 4th)
    August 4, 2025

    New Feature: Daily Trends Report, (Mon, Aug 4th)

    I implemented a new report today, the “Daily Trends” report. It summarizes noteworthy data received from our honeypot. As with everything, it will improve if you provide feedback 🙂 There are two ways to receive the report: E-Mail: Sign up at https://isc.sans.edu/notify.html  JSON/HTTP: You may also just download the raw JSON data for the report…

    Read More

  • August 4, 2025

    ISC Stormcast For Monday, August 4th, 2025 https://isc.sans.edu/podcastdetail/9554, (Mon, Aug 4th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • August 3, 2025

    Legacy May Kill, (Sun, Aug 3rd)

    Just saw something that I thought was long gone. The username “pop3user” is showing up in our telnet/ssh logs. I don’t know how long ago it was that I used POP3 to retrieve e-mail from one of my mail servers. IMAP and various webmail systems have long since replaced this classic email protocol. But at…

    Read More

  • August 1, 2025

    ISC Stormcast For Friday, August 1st, 2025 https://isc.sans.edu/podcastdetail/9552, (Fri, Aug 1st)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • Scattered Spider Related Domain Names, (Thu, Jul 31st)
    July 31, 2025

    Scattered Spider Related Domain Names, (Thu, Jul 31st)

    This week, CISA updated its advisory on Scattered Spider. Scattered Spider is a threat actor using social engineering tricks to access target networks. The techniques used by Scattered Spider replicate those used by other successful actors, such as Lapsus$. Social engineering does not require a lot of technical tools; creativity is key, and defenses have…

    Read More

←Previous Page
1 … 10 11 12 13 14 … 52
Next Page→

Our Sponsors

Quick Links

About Us
Individuals
Business
Resources

Contact

Twitter
Facebook
LinkedIn

Copyright © 2022 Cyber Safe NV. All Rights Reserved.