cissp
16.5K subscribers
955 photos
66 videos
1.73K files
4.8K links
@cissp
International channel 4 Transmission Knowledge In the Field of Cyber Security with a Focus on the Content of the CISSP-ISC2 Course
- - - - - - - - - -
+also group: https://t.me/cisspgroup
—————————
@alirezaghahrood
Download Telegram
Forwarded from PacktPub Free Learning
[#PacktPub] Cybersecurity - Attack and Defense Strategies
Best of Command & Control
4 (Red Teaming)

•Command & Control: Ares
•Command & Control: WebDav C2
•Command & Control: WebSocket C2
•Command and Control with DropboxC2
•dnscat2: Command and Control over the DNS
•Command & Control: Silenttrinity Post-Exploitation Agent
•Command & Control Tool: Pupy
•Command and Control Guide to Merlin
•Command and Control with HTTP Shell using JSRat
•Koadic – COM Command & Control Framework
•TrevorC2 – Command and Control

https://lnkd.in/fCua_6e
What's the difference between bagging and boosting?

Bagging and boosting are both ensemble methods, meaning they combine many weak predictors to create a strong predictor.

One key difference is that bagging builds independent models in parallel and "averages" their results in the end, whereas boosting builds models sequentially, at each step emphasizing reducing error that remains in the model by better fitting to the observations that were missed in previous steps.
What are CISOs most pressing cybersecurity challenges?

Data security, privacy, IAM and SOAR👌🏽
SIEM is "Suckers Investment for Event Management" 😋

Just Imagine, ... instead of a SIEM, if you spend that money on internal training and certification for developers and admins, and a strong internal security culture. Couple that with an external provider that offers a scanner that acts as your "red team on autopilot" or a web vulnerability scanner (some services even monitor for GDPR compliance, not just defacements or webshells). The money still left from what would make the difference to the price of the SIEM (oh don't worry, there is plenty left over), you hire a reputable external pentest firm and really engage with them. Put that in your budget for recurring years and you got actual security. Instead of a SIEM, which the babysitting of - isn't an actual "skill" people can put on their CV.

R y agree!?
OODA!
official new SANS MGT521 course on Security Culture. If you are an experienced Awareness Officer or senior Security Leader looking to develop your culture, join us 23/24 Feb in San Francisco. https://lnkd.in/e8vxuSf

👍🏽👌🏽
What Is Personally Identifiable Information (PII)?

Personally identifiable information (social security numbers, addresses, names, etc.) is frequently targeted during cyber-attacks.

A DEFINITION OF PERSONALLY IDENTIFIABLE INFORMATION

The United States Department of Labor defines personally identifiable information as: “Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred be either direct or indirect means.

https://digitalguardian.com/blog/what-personally-identifiable-information