Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Compliance

Cybersecurity Expert Witness Craig Petronella

Cybersecurity Expert Witness Craig Petronella


Posted August 23, 2023 in Cryptocurrency, Digital Forensics, Malware

Craig Petronella serves as a cybersecurity expert witness in computer crime cases. Learn about his forensic analysis...

How Cybersecurity Experts Find the Bad Guys Online

How Cybersecurity Experts Find the Bad Guys Online


Posted August 23, 2023 in AI, Data Breach, Malware

Ever wonder how investigators catch hackers? Learn the digital forensics techniques and threat hunting methods used...

Cybersecurity Expert Witness: Craig Petronella

Cybersecurity Expert Witness: Craig Petronella


Posted August 23, 2023 in Cryptocurrency, HIPAA, Compliance, Digital Forensics, Data Breach, Ransomware, Malware

Craig Petronella serves as a cybersecurity expert witness for litigation involving data breaches, digital forensics,...

CMMC Security Awareness Training: Complete 2026 Guide

CMMC Security Awareness Training: Complete 2026 Guide


Posted August 23, 2023 in CMMC, Compliance, Malware, Data Breach

Meet CMMC security awareness training requirements with this definitive guide. Covers Level 1-3 obligations, approved...

Raccoon Stealer Malware: How It Works and How to Stop It

Raccoon Stealer Malware: How It Works and How to Stop It


Posted August 21, 2023 in Cryptocurrency, Malware, Data Breach

Raccoon Stealer malware targets passwords, crypto wallets, and browser data. Learn how this info-stealer spreads and...

Real-World Penetration Testing Examples

Real-World Penetration Testing Examples


Posted August 21, 2023 in Data Breach, Penetration Testing, HIPAA, Malware

Real-world penetration testing, often dubbed as ethical hacking, is a proactive cybersecurity measure where experts...

SIM Swap Attacks and Cryptocurrency Scams

SIM Swap Attacks and Cryptocurrency Scams


Posted August 21, 2023 in Cryptocurrency, Bitcoin, Malware, Data Breach

SIM swap attacks let criminals hijack your phone number to steal crypto and bypass 2FA. Learn how these scams work...

Google Cloud Penetration Testing: Rules and Best Practices

Google Cloud Penetration Testing: Rules and Best Practices


Posted August 21, 2023 in Cloud Security, Compliance, Data Breach, Penetration Testing, Malware

Can you pen test Google Cloud? Yes — here are the rules, scope limitations, and proven methodologies for securing...

Keyboard Encryption Software: Stop Keyloggers Cold

Keyboard Encryption Software: Stop Keyloggers Cold


Posted August 21, 2023 in Work from Home, Malware, Data Breach

Protect every keystroke with keyboard encryption software. Learn how anti-keylogger tools block credential theft and...

Microsoft Azure Penetration Testing Guide

Microsoft Azure Penetration Testing Guide


Posted August 21, 2023 in Cloud Security, Compliance, Penetration Testing, Malware, Data Breach

Azure penetration testing identifies cloud security gaps before attackers exploit them. Learn scope, methodology, and...

NIST 800-53: Antivirus & Cybersecurity Standards

NIST 800-53: Antivirus & Cybersecurity Standards


Posted August 21, 2023 in NIST, Malware, Compliance, Data Breach

The realm of cybersecurity is expansive, with various guidelines and frameworks available to bolster digital...

Incident Response Training for Your Team

Incident Response Training for Your Team


Posted August 21, 2023 in Compliance, Ransomware, Data Breach, Digital Forensics, Malware

Incident response training prepares your team to act fast when a breach occurs. Learn how structured drills and plans...