https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/10/the.jpg?fit=475%2C250&ssl=1 250 475 Ronald McClellan https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Ronald McClellan2018-10-28 22:22:152018-10-28 22:32:30A Book Review of “Pentesting Azure Applications” by Matt Burrough
In this book review, I looked at the topic of pentesting cloud-based applications, specifically Microsoft’s Azure. While the focus of the book was for Azure, a lot of the information will be beneficial no matter the cloud environment.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/10/LMA2.png?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-10-01 00:51:182018-10-03 14:45:50A Book Review of “Learning Malware Analysis” by Monnappa KA
I found “Learning Malware Analysis” to be very informative, easy to read as well as follow, moreover I found the examples in the book easy to replicate which was priceless.
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2018/09/CM.jpg?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-09-10 15:19:162018-10-04 10:23:44Cyberwar Season 1 – Episode 3: Cyber Mercenaries
Authoritarian regimes are using spyware tools bought from private companies in the West. Hacker PhineasFisher targeted these companies to reveal their deals to suppress dissent.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2018/08/PCI4.jpg?fit=475%2C250&ssl=1 250 475 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-08-31 12:55:592018-10-03 14:59:58Book Review of “Practical Cyber Intelligence” by Wilson Bautista Jr
Bautista’s approach of the book “Practical Cyber Intelligence” was comprehensive for both the beginner and seasoned security practitioner regardless of their role. I do think seasoned professional in leadership will find more value in the text as compared to a Jr. Security Analyst. In addition, as an educator, this text definitely has a role in the academic realm especially in the graduate level.
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2018/08/sony_hacker_110603_620x350.jpg?fit=565%2C319&ssl=1 319 565 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-08-01 13:02:202018-08-01 13:02:20Cyberwar Season 1 – Episode 2: The Sony Hack
At that time (2014) the Sony Hack was one of the worst attacks against a corporation. Not only were embarrassing emails released, personal health records of employees and their family and social security numbers to name a few were dumped.
https://i0.wp.com/www.securityorb.com/wp-content/uploads/2018/07/anonymous-logo.jpg?fit=625%2C400&ssl=1 400 625 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2018-07-31 12:29:272018-07-31 12:29:27Cyberwar Season 1 – Episode 1 Recap: Who is Anonymous?
The first episode looked into the decentralized group of international activist hackers known as “Anonymous” which has been linked to numerous high-profile incidents over the years, including Internet attacks on governments, major corporations, financial institutions and religious groups.
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2016/11/networksecurity_0.jpg?fit=1440%2C500&ssl=1 500 1440 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2016-11-01 11:31:192016-11-01 11:31:19The Top 5 Free Network Security Vulnerability Security Scanners
A vulnerability scanner is software application that assesses…
https://i2.wp.com/www.securityorb.com/wp-content/uploads/2015/06/index.jpg?fit=240%2C160&ssl=1 160 240 SecurityOrb_Staff https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png SecurityOrb_Staff2015-06-23 13:30:052016-07-20 21:11:29The Internet of Things Comes to the DoD–With Disastrous Consequences
The Internet of Things Comes to the DoD–With Disastrous Consequences
https://i1.wp.com/www.securityorb.com/wp-content/uploads/2015/05/pentest_cover-web.png?fit=492%2C650&ssl=1 650 492 Kellep Charles https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Kellep Charles2015-05-18 16:18:292016-07-16 21:08:24A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking” by Georgia Weidman (@georgiaweidman)
A Book Review of “Penetration Testing: A Hands-On Introduction to Hacking”
https://i1.wp.com/www.securityorb.com/wp-content/uploads/2015/01/m_blackhat_620.jpg?fit=620%2C320&ssl=1 320 620 Ronald McClellan https://www.securityorb.com/wp-content/uploads/2020/06/SecurityOrb_Logo-1.png Ronald McClellan2015-01-19 00:19:522016-07-20 21:06:39Even Thor Couldn’t save “Blackhat”
Let’s face it here, the term “Blackhat” is related to hacking but it’s clear they didn’t have anybody on the set that knew what that meant