You might be interested in …

[SANS ISC] Network Forensics on Azure VMs (Part #1), (Thu, Jun 17th)

All posts, Sans-ISC

The tooling to investigate a potentially malicious event on an Azure Cloud VM is still in its infancy. We have covered before (Forensicating Azure VMs) how we can create a snapshot of the OS disk of a running VM. Snapshotting and then killing off the infected VM is very straight forward, but it also tips […]

Read More

[ZDNet] Turbocharge your IT career with this cybersecurity training that is on sale for just $30

All posts, ZDNet

You don’t need much more than a couple of years of IT experience to start specializing in the elite cybersecurity field. All you need is the right training, so get it now while it’s convenient and affordable. Source: Read More (Latest topics for ZDNet in Security)

Read More

[ZDNet] New ransomware: CISA warns over FiveHands file-encrypting malware variant

All posts, ZDNet

New malware has already been used in a cyberattack against one organisation. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.