Tag Archives: cybertraining 365

Teaming up with the Women in Cybersecurity Conference

women in cybersecurity

Teaming up with the Women in Cybersecurity Conference The Women in Cybersecurity (WiCys) Conference is around the corner (March 31- April 1) and promises some must-attend events. With capture the flags and workshops in a broad array of topics (i.e. reverse engineering, applied cryptography, planning next career steps and business… Read more »

CyberTraining 365 partners with ICMCP offering world-class Cyber Security Training

cyber security training

CyberTraining 365 Cyber Security Training for ICMCP We are proud to announce our newest scholarship for the International Consortium of Minority Cybersecurity Professionals (ICMCP). Offering 100 ICMCP Members with 6 months of free access to our online academy, CyberTraining 365 hopes to give those new to cybersecurity the skills they need to… Read more »

How to become a Malware Analyst

How to become a Malware Analyst

How to become a Malware Analyst Browse our course library and get your career path started today! What is a Malware Analyst? A Malware Analyst is just as it sounds, an analyzer of malware. Examining malicious software, the malware analyst often works closely with Incident Responders, and perhaps even Computer… Read more »

#CyberHeadlines: Three Unresolved Vulnerabilities

#CyberHeadlines

#CyberHeadlines: Three Unresolved Vulnerabilities Companies seem to like to deny security vulnerabilities found by cyber security experts. That’s why they remain largely unresolved. Here are three recent unresolved vulnerabilities which you are likely vulnerable to… Unresolved Vulnerabilities #1: Netgear flaw compromises thousands of devices open to attack On Friday, December… Read more »

#CyberHeadlines: 2016 The Year of Ransomware

#CyberHeadlines

2016 The Year of Ransomware Kaspersky Lab 2016 Ransomware Report Kaspersky Lab has deemed 2016 “The year of ransomware”. In a recent report they published, ransomware attacks went up eleven fold from January 2016 to September 2016 with 62 new ransom families detected, one in five businesses worldwide suffered from a… Read more »

Hacks, Leaks and Breaches: Our Top 6 Stories of 2016

Hacks, Leaks and Breaches: Our Top 6 Stories of 2016 2016 brought more hacks, leaks and breaches to light than any previous year. Many of these issues will persist into 2017, especially with all the claims around the Russians hacking the DNC, a rise of DDoS-for-Sale services and ransomware continuing… Read more »

#CyberHeadlines: Cyber Security Assurance Report Card

#CyberHeadlines

#CyberHeadlines: Cyber Security Assurance Report Card Tenable Network Security’s 2017 Global Cybersecurity Assurance Report Card In partnership with CyberEdge Group, Tenable Network Security published 2017 Global Cyber Security Assurance Report Card, in follow up to last year’s report. In this most recent report, they were not looking for actual effectiveness… Read more »

#CyberHeadlines: Avalanche Network Dismantled

#CyberHeadlines: Avalanche Network Dismantled The Avalanche Network has finally been dismantled by EU and US officials Last week in Europe, the European Union in conjunction with US authorities announced that they had disabled the Avalanche fraud network, responsible for 2/3 phishing attacks in 2009. The Avalanche group is a hacker… Read more »

#CyberHeadlines: Russian Cyber Pros and Trump’s Hacker Army

#CyberHeadlines: Russian Cyber Pros and Trump’s Hacker Army Russia claims to have stopped a cyber attack from a foreign spy service Russia’s Federal Security Service made a public statement on Friday that they had halted an attack meant to be carried out on Dec. 5th against a number of major… Read more »

#CyberHeadlines: UK Cyber Security Legacy

#CyberHeadlines: UK Cyber Security Legacy Legacy WWII coding building now cybersecurity school in UK The Government Code and Cipher School at Bletchley Park is returning to its cyber security legacy, by being converted back into a school for cybersecurity. Bletchley Park is where Alan Turing cracked the Nazi Military’s Enigma Machine… Read more »