Cybersecurity Blog
Posts tagged: Malware
Category: Compliance
Cybersecurity Expert Witness Craig Petronella
Posted August 23, 2023 in Cryptocurrency, Digital Forensics, Malware
Craig Petronella serves as a cybersecurity expert witness in computer crime cases. Learn about his forensic analysis...
How Cybersecurity Experts Find the Bad Guys Online
Posted August 23, 2023 in AI, Data Breach, Malware
Ever wonder how investigators catch hackers? Learn the digital forensics techniques and threat hunting methods used...
Cybersecurity Expert Witness: Craig Petronella
Posted August 23, 2023 in Cryptocurrency, HIPAA, Compliance, Digital Forensics, Data Breach, Ransomware, Malware
Craig Petronella serves as a cybersecurity expert witness for litigation involving data breaches, digital forensics,...
CMMC Security Awareness Training: Complete 2026 Guide
Posted August 23, 2023 in CMMC, Compliance, Malware, Data Breach
Meet CMMC security awareness training requirements with this definitive guide. Covers Level 1-3 obligations, approved...
Raccoon Stealer Malware: How It Works and How to Stop It
Posted August 21, 2023 in Cryptocurrency, Malware, Data Breach
Raccoon Stealer malware targets passwords, crypto wallets, and browser data. Learn how this info-stealer spreads and...
Real-World Penetration Testing Examples
Posted August 21, 2023 in Data Breach, Penetration Testing, HIPAA, Malware
Real-world penetration testing, often dubbed as ethical hacking, is a proactive cybersecurity measure where experts...
SIM Swap Attacks and Cryptocurrency Scams
Posted August 21, 2023 in Cryptocurrency, Bitcoin, Malware, Data Breach
SIM swap attacks let criminals hijack your phone number to steal crypto and bypass 2FA. Learn how these scams work...
Google Cloud Penetration Testing: Rules and Best Practices
Posted August 21, 2023 in Cloud Security, Compliance, Data Breach, Penetration Testing, Malware
Can you pen test Google Cloud? Yes — here are the rules, scope limitations, and proven methodologies for securing...
Keyboard Encryption Software: Stop Keyloggers Cold
Posted August 21, 2023 in Work from Home, Malware, Data Breach
Protect every keystroke with keyboard encryption software. Learn how anti-keylogger tools block credential theft and...
Microsoft Azure Penetration Testing Guide
Posted August 21, 2023 in Cloud Security, Compliance, Penetration Testing, Malware, Data Breach
Azure penetration testing identifies cloud security gaps before attackers exploit them. Learn scope, methodology, and...
NIST 800-53: Antivirus & Cybersecurity Standards
Posted August 21, 2023 in NIST, Malware, Compliance, Data Breach
The realm of cybersecurity is expansive, with various guidelines and frameworks available to bolster digital...
Incident Response Training for Your Team
Posted August 21, 2023 in Compliance, Ransomware, Data Breach, Digital Forensics, Malware
Incident response training prepares your team to act fast when a breach occurs. Learn how structured drills and plans...