• Home
    • News
  • Individuals
    • Students
    • Senior Nevadans
    • Parents & Educators
  • Business
    • Small Business
    • Medium To Large Business
    • Leadership
  • Resources
  • About Us
    • Sponsors
CybersafeNV - CybersafeNV Website

Category: SANS Full Feed


  • July 14, 2025

    ISC Stormcast For Monday, July 14th, 2025 https://isc.sans.edu/podcastdetail/9524, (Mon, Jul 14th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • July 13, 2025

    Experimental Suspicious Domain Feed, (Sun, Jul 13th)

    We have had a “newly registered domain” feed for a few years. This feed pulls data from ICANN’s centralized zone data service (https://czds.icann.org) and TLS certificate transparency logs. The ICANN CZDS is a good start, but it only offers data from top-level domains collaborating with ICANN. Missing are in particular country-level domains. Country-level zone files…

    Read More

  • July 11, 2025

    ISC Stormcast For Friday, July 11th, 2025 https://isc.sans.edu/podcastdetail/9522, (Fri, Jul 11th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • July 10, 2025

    ISC Stormcast For Thursday, July 10th, 2025 https://isc.sans.edu/podcastdetail/9520, (Thu, Jul 10th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • SSH Tunneling in Action: direct-tcp requests [Guest Diary], (Wed, Jul 9th)
    July 10, 2025

    SSH Tunneling in Action: direct-tcp requests [Guest Diary], (Wed, Jul 9th)

    [This is a Guest Diary by Sihui Neo, an ISC intern as part of the SANS.edu BACS program] As part of the SANS degree program curriculum, I had the opportunity to set up a honeypot to monitor log activities mimicking a vulnerable server. I used the AWS free tier EC2 instance to set up the…

    Read More

  • July 9, 2025

    Setting up Your Own Certificate Authority for Development: Why and How., (Wed, Jul 9th)

    There are several reasons why one would set up an internal certificate authority. Some are configured to support strong authentication schemes, some for additional flexibility and convenience. I am going to cover the second part. In particular, it can be helpful for developers to have an internal certificate authority to issue certificates for development purposes.…

    Read More

  • July 9, 2025

    ISC Stormcast For Wednesday, July 9th, 2025 https://isc.sans.edu/podcastdetail/9518, (Wed, Jul 9th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • July 8, 2025

    Microsoft Patch Tuesday, July 2025, (Tue, Jul 8th)

    Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft’s portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been exploited. Noteworthy Vulnerabilities: CVE-2025-49695 and CVE-2025-49696: Both vulnerabilities affect Microsoft Office,…

    Read More

  • July 8, 2025

    ISC Stormcast For Tuesday, July 8th, 2025 https://isc.sans.edu/podcastdetail/9516, (Tue, Jul 8th)

    (c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

    Read More

  • What’s My (File)Name?, (Mon, Jul 7th)
    July 7, 2025

    What’s My (File)Name?, (Mon, Jul 7th)

    Modern malware implements a lot of anti-debugging and anti-analysis features. Today, when a malware is spread in the wild, there are chances that it will be automatically sent into a automatic analysis pipe, and a sandbox. To analyze a sample in a sandbox, it must be “copied” into the sandbox and executed. This can happen…

    Read More

←Previous Page
1 … 18 19 20 21 22 … 57
Next Page→

Our Sponsors

Quick Links

About Us
Individuals
Business
Resources

Contact

Twitter
Facebook
LinkedIn

Copyright © 2022 Cyber Safe NV. All Rights Reserved.