eLearnSecurity Blog

Category: Blog posts

The Cyber Insecurity Show: Home Networks, Zoom Zero Day, Mobile App Fraud and Emergency Management

Welcome to the second episode of Cyber Insecurity, eLearnSecurity’s weekly show on all things cyber security. You can check us out on YouTube or on INE’s The IT Experts Network wherever you listen to podcasts.

This week Neal Bridges, Jeff Golz and Matt Kreisher tackle a number of topics related to the increased threat landscape due to COVID-19.

Read more

eLearnSecurity Cyber Security News Roundup: June 25

eLearnSecurity Launches Version 2 of Penetration Testing eXtreme

On Tuesday, June 23, eLearnSecurity released the latest version of Penetration Testing Extreme, our most advanced pentesting course. We overhauled PTXv2 to address modern TTPs, especially regarding Active Directory attacks. Our course designers have also created 100+ hands-on red teaming challenges spread across 11+ attack scenarios in our industry leading labs.

Read more

Pentesting 101: Hiding While Fingerprinting

by Hisomeru

So far, the Fingerprinting section of our Pentesting 101 series has shown scans originating from a personal network. That isn’t always ideal in some situations. While following the attack methodologies found in the APT-1 report, Mandiant did not talk about APT-1 doing any type of scanning or fingerprinting.

Read more

eLearnSecurity Cyber Security News Roundup: May 28

Malware and Web Application Security and Phishing OH MY!

eLearnSecurity Launches Malware Analysis Professional Course

eLearnSecurity officially launched our latest cyber security training course, Malware Analysis Professional (MAP) on May 19. As malware continues to plague modern industry, many organizations struggle to comprehend the effects of an attack, where the vulnerability started and the consequences of such a breach. 

Read more

Pentesting 101: Fingerprinting

by Hisomeru

Introduction to Fingerprinting

So far in the introduction to penetration testing series of articles, we have covered non-intrusive ways of gathering intelligence on a target network. Using Technical and Human OSINT helped create a picture of the target network that is subject to a penetration test through unobtrusive means.

Read more

Go to top of page