Notes from AfricaHackOn: Bank IT Security in Kenya.
Review from IT Security Conference in Kenya. Find out how Bank IT Security is developing in Kenya. AfricaHackOn 2014, first …
Brazilian banking Trojan disguised as Microsoft anti-virus software
A Trojan (identified as Trojan-Downloader.Win32.VB.aoff) is targeting Windows-based systems by removing built-in AV software and clearing a path for cybercriminals …
SpyEye banking Trojan uses SMS hijacking feature
SpyEye has been observed trying to trick users into reassigning their cellphone numbers to receive one-time passwords (OTP) from their …
SpitMo SpyEye toolkit targeting Android smartphones
The SpitMo SpyEye hacking toolkit app is targeting smartphones running on the Android operating system according to security vendor Trusteer. …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations
The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …
Space Cybersecurity: a Strategic Issue in the Current Geopolitical Context
by Anaïs Shay-Lynn Vydelingum The security of space infrastructures is a geopolitical issue, as space-based resources are increasingly used by …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.