top of page
Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
abdelsyfane
May 30, 20222 min read
CTI Networking Report
Originally published on January 28, 2022 on Blog.Pulsedive.com Author: Grace Chi "Is Sharing Caring? A report on current cyber threat...
54 views0 comments
abdelsyfane
May 2, 20225 min read
If You Use the Same Passwords for Every Thing, CHANGE THEM NOW!
Author Eric Tsang After analyzing password attacks using my honeypot, one easy thing you can do to protect yourself is to have strong...
115 views0 comments
abdelsyfane
Apr 4, 20226 min read
Breaking Down LOLBAS Attacks With The Help Of Hunter-gatherers
This was originally published on February 4, 2022 on the Scythe blog page. Author Nathali Cano https://frontporchne.com/article/tanzanias...
176 views0 comments
abdelsyfane
Aug 9, 20216 min read
Let’s Talk About Windows Drivers
Author John Neff Another day, another Windows driver vulnerability. Cyber Security professionals found their Windows networks...
204 views0 comments
abdelsyfane
Jul 12, 20214 min read
More Fun with MITRE ATT&CK Navigator and NIST SP 800-53
Part 2 Author Elaine Harrison-Neukirch In part 1 of Fun with MITRE ATT&CK Navigator and NIST SP 800-53, I introduced MITRE ATT&CK, ATT&CK...
1,254 views0 comments
abdelsyfane
Jun 14, 20213 min read
Fun with MITRE ATT&CK Navigator and NIST SP 800-53
Part 1 of a 2 part blog Author Elaine Harrison-Neukirch I recently left the Security Analyst world and now work in the Adversary...
1,260 views0 comments
Emily Stamm
May 31, 20215 min read
CyberChef – Data decoding made easy
Author Kevin Kipp A SOC Analysts’ job can sometimes seem overwhelming. There is a myriad of obfuscation techniques that adversaries can...
80,787 views1 comment
Emily Stamm
May 3, 20215 min read
Build Your Own Home Cyber Range: Part 1
This article originally appeared on Code Fellows with the title "Build Your Own Home Cyber Range: Part 1" Author David Lee Ever wondered...
248 views0 comments
Emily Stamm
Feb 15, 20213 min read
Using OSINT Reconnaissance to Protect Your Organization
Author Britton White Open Source Intelligence (OSINT) reconnaissance involves using publicly available resources to passively gather...
1,642 views0 comments
Emily Stamm
Feb 4, 20215 min read
Digital Document Signing Laws: an Overview
This article originally appeared on SSL.com with the title Digital Document Signing Laws: A Global View Author: Connor Wilson If the...
18 views0 comments
Emily Stamm
Feb 1, 20213 min read
Why You Should Embrace Purple Team Today
Introducing Purple Teaming Author Jorge Orchilles Wait, wait, wait, are you introducing us to another color in information security? Yes...
152 views0 comments
Emily Stamm
Jan 25, 20214 min read
Skim Hacks: What They Are and How to Defend Against Them
Author: Jen Stone With so much critical information available online, malicious actors have found increasingly insidious (and automated)...
109 views0 comments
Emily Stamm
Nov 9, 20202 min read
BEWARE the SOCK PUPPET! An OSINT Technique in Social Engineering
Author Reynaldo Gonzalez When we go online, it provides us the opportunity to explore, learn something new, or share moments and...
1,176 views0 comments
abdelsyfane
Oct 26, 20202 min read
VLANs Are Your Friend
A Virtual Local Area Network can be simply defined as a group of devices on different LAN segments
39 views0 comments
abdelsyfane
Jun 29, 20202 min read
What You Need To Know About Vetting
Simple and practical advice on how to vet apps and cloud services.
29 views0 comments
abdelsyfane
May 25, 20203 min read
Protect Yourself From An E-Mail Scam Today
How to protect yourself from BEC (Business Email Compromise)
37 views0 comments
bottom of page