Skip to Main Content

Beware of the scammers: Cyberattack

Online articles





Mitigations for Security Vulnerabilities Found in Control System Networks

This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flaws.

CISA.gov 

Hacker types, motivations and strategies: A comprehensive framework

This framework, applicable to various domains, allows readers to map various motivations to each hacker type and understand that hackers often hold multiple motivations at once. It also allows for the identification of specific hacker types based on the strategies used during a cyberattack.

sciencedirect.net 

eBooks

Videos


Hackers & Cyber Attacks: Crash Course Computer Science #32 by The Crash Course

Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are malicious cybercriminals intent on stealing your data (these people are known as Black Hats).



Cybersecurity Expert Answers Hacking Questions From Twitter | Tech Support | WIRED by WIRED

Today we're going to talk about hackers and their strategies for breaking into computer systems. Now, not all hackers are are Facebook Offensive Security Engineer Amanda Rousseau aka "Malware Unicorn" uses the power of Twitter to answer common questions about hacking. As an offensive security engineer, Amanda has seen just about everything when it comes computer hacking.



Cyber Threat Hunting: Identify and Hunt Down Intruders by Infosec

Are you red team, blue team — or both? Get an inside look at the offensive and defensive sides of information security in our webinar series.



Cybersecurity expert shares 5 hacking techniques and how to prevent them by Tech in Asia

In 2019, one business fell victim to ransomware attacks every 14 seconds. That number will go down to 11 seconds by 2021.

Infographic

Digital Information World. How Do Hackers? [Infographic].