How to setup SOC using open-source tools

Let’s discuss how we can build a SOC (Security Operation Center) using open source software. A security operations center (SOC) is a centralized unit that deals with security issues on an organizational and technical level. A SIEM is the most important tool...

The Unpacking Spear Phishing Susceptibility Report

Recently,  Zinaida Benenson, Freya Gassmann, and Robert Landwirth of  Friedrich-Alexander-Universit¨at Erlangen-N¨urnberg, Germany and  Universit¨at des Saarlandes, Germany respectfully conducted research on the habits of an individual clicking on a spear phishing...

The U.S. Government is moving…to the Cloud.

Recently, President Donald Trump signed an executive order on cybersecurity to bolster the government’s cybersecurity and protect critical infrastructure from cyber attacks, marking his first significant action to address what he has called a top priority. This...

Is there no longer any privacy on the Internet?

Recently, President Trump signed into law a resolution that repealed protections requiring Internet service providers to get your permission before collecting and sharing data. These protections, which had not yet gone into effect, were approved by the Federal...

Is the CIA listening to you through your TV?

Recently Wikileaks started releasing confidential documents from the CIA in a new series they are calling Vault 7. In the first part of the series, called Year Zero, they released over 8700 documents they claim to be confidential CIA hacking and spying documents....