Tag: OffSec

Post-quantum Cryptography in 2024

Explore post-quantum cryptography’s rise in 2024 and how new standards prepare us for future quantum attacks, ensuring secure data. The post Post-quantum Cryptography in 2024 appeared first on OffSec. This article has been indexed from OffSec Read the original article:…

How to Become a Cybersecurity Engineer

Learn how to become a cybersecurity engineer, including the educational paths to follow, the crucial skills and certifications needed, and more. The post How to Become a Cybersecurity Engineer appeared first on OffSec. This article has been indexed from OffSec…

Education Sector Common Breaches and Cyber Threats

Learn about the most common threats and biggest data breaches for the educational sector. The post Education Sector Common Breaches and Cyber Threats appeared first on OffSec. This article has been indexed from OffSec Read the original article: Education Sector…

Top Technology Sector Breaches and Threats

Discover the top 5 cyber threats targeting tech companies, learn from major data breaches, and explore how OffSec’s cybersecurity training can equip you to defend against evolving attacks. Safeguard your organization’s future. The post Top Technology Sector Breaches and Threats…

AMSI Write Raid 0day Vulnerability

In this blog post, we’ll introduce a new 0day technique designed to bypass AMSI without the VirtualProtect API and without changing memory protection. The post AMSI Write Raid 0day Vulnerability appeared first on OffSec. This article has been indexed from…

How Cybersecurity Training Lowers Insurance Premiums

Discover the essential cybersecurity training elements that insurers look for and how to build a winning program. The post How Cybersecurity Training Lowers Insurance Premiums appeared first on OffSec. This article has been indexed from OffSec Read the original article:…

The Role of Cybersecurity Training in Compliance

Learn about the role of cybersecurity training in compliance. Discover how OffSec’s training can contribute to a strong compliance posture. The post The Role of Cybersecurity Training in Compliance appeared first on OffSec. This article has been indexed from OffSec…

Proactive Threat Detection: Introducing Threat Hunting Essentials

Outsmart evolving cyber threats with Threat Hunting Essentials. This hands-on training path builds expertise in threat actor analysis, advanced hunting techniques, and data analysis. The post Proactive Threat Detection: Introducing Threat Hunting Essentials appeared first on OffSec. This article has…

Cybersecurity Compliance: Understanding Regulatory Frameworks

Learn about the importance of cybersecurity compliance, most common cybersecurity compliance frameworks and how to navigate their complexities. The post Cybersecurity Compliance: Understanding Regulatory Frameworks appeared first on OffSec. This article has been indexed from OffSec Read the original article:…

Attacks happen all the time – just this month, the cybersecurity community was shaken by the discovery of the Xz backdoor, a malicious exploit hidden within the popular open-source project XZ Utils. This backdoor, cleverly concealed within a seemingly legitimate…

Communication Skills in Cybersecurity

This blog is based on a conversation we had with Eugene Lim. Eugene is a Senior Cybersecurity Engineer who has earned the OSCP, OSCE3, and OSEE certifications. Follow him on X @spaceraccoonsec and learn about infosec and white hat hacking…