Pig butchering, the crypto-based scammer scourge that has pulled in an estimated $75 billion from victims globally, is spreading beyond its roots in Southeast Asia, with operations proliferating across the Middle East, Eastern Europe, Latin America, and West Africa. The… Read More "The FBI Still Hasn’t Cracked NYC Mayor Eric Adams’ Phone"
Did a Chinese University Hacking Competition Target a Real Victim?
Capture the flag hacking contests at security conferences generally serve two purposes: to help participants develop and demonstrate computer hacking and security skills, and to assist employers and government agencies with discovering and recruiting new talent. But one security conference… Read More "Did a Chinese University Hacking Competition Target a Real Victim?"
Apple’s New Passwords App May Solve Your Login Nightmares
Apple’s latest iPhone software update, iOS 18, arrives today and includes a new app: Passwords. For the first time, Apple is taking your phone’s ability to save login details and putting them in a standalone app. It could help improve… Read More "Apple’s New Passwords App May Solve Your Login Nightmares"
ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions
Paragon was founded in 2019 by veterans from the Israel Defense Forces’ powerful intelligence Unit 8200 with the active involvement of former Israeli prime minister Ehud Barak as an investor who is estimated to own a sizable slice of the… Read More "ICE Signs $2 Million Contract With Spyware Maker Paragon Solutions"
Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence
International law enforcement has worked for years to disrupt the cybercriminal gang Evil Corp and its egregious global crime spree. But in a crowded field of prolific Russian cybercriminals, Evil Corp is most notable for its singular relationship with Russian… Read More "Notorious Evil Corp Hackers Targeted NATO Allies for Russian Intelligence"
Security+ Domain 5 – Security Program Management and Oversight
Security+ Domain 5 – Security Program Management and Oversight (20% weightage) Key terms and definitions from this objective are given below: 5.1 Summarize elements of effective security governance. Policies: Standards: Procedures: External Considerations: Monitoring and Revision: Ongoing processes of reviewing,… Read More "Security+ Domain 5 – Security Program Management and Oversight"
Security+ Domain 4 – Security Operations
Security+ Domain 4 – Security Operations (28% weightage) Key terms and definitions from this objective are given below: 4.1 Given a scenario, apply common security techniques to computing resources. Secure Baselines: Hardening Targets: Wireless Devices: Installation Considerations: Mobile Solutions: Mobile… Read More "Security+ Domain 4 – Security Operations"
Security+ Domain 3 – Security Architecture
Security+ Domain 3 – Security Architecture (18% weightage) Key terms and definitions from this objective are given below: 3.1 Compare and contrast security implications of different architecture models. Architecture and Infrastructure Concepts: Cloud: Infrastructure as Code (IaC): IaC is a practice… Read More "Security+ Domain 3 – Security Architecture"
Security+ Domain 2 – Threats, Vulnerabilities, and Mitigations
Security+ Domain 2 – Threats, Vulnerabilities, and Mitigations (22% weightage) Key terms and definitions from this objective are given below: 2.1 Compare and contrast common threat actors and motivations. Threat Actors: Attributes of Actors: Motivations: 2.2 Explain common threat vectors… Read More "Security+ Domain 2 – Threats, Vulnerabilities, and Mitigations"
Security+ Domain 1 – General Security Concepts
Security+ Domain 1 – General Security Concepts (12% weightage) Key terms and definitions from this objective are given below: 1.1 Compare and contrast various types of security controls. Categories: Control Types: 1.2 Summarize fundamental security concepts. Confidentiality, Integrity, and Availability… Read More "Security+ Domain 1 – General Security Concepts"