SEVN-X Blog
A Blog for Nerds
Featured Post
Crowdstrike Bricks Windows
Jan 21, 2025 4:08:47 PMMatt Barnett sits down with NBC10 to talk about how an update from CrowdStrike on Friday, July 19 brought down millions ...
Voice Cloning: The Rising Threat of Audio Deepfakes in Impersonation Scams
Jan 21, 2025 4:07:58 PMAuthor: Stephen Bondurich Introduction By now, most of us know how to handle a suspicious phone call from a stranger. We...
NIST Cybersecurity Framework 2.0: Respond
Jan 21, 2025 3:47:05 PMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 8 Today, we will take a deep dive into the RES...
Cooking for Hashcat: Improving Old Recipes and Exploring New Ones
Jan 21, 2025 2:47:44 PMRecorded at Grassr00tz 2024 in Appleton, Wisconsin, SEVN-X's Vitaliy "Kelly" Kovalchuk presents on improving password cr...
NIST Cybersecurity Framework 2.0: Detect
Jan 21, 2025 2:46:45 PMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 7 Today, we will take a deep dive into the DET...
NIST Cybersecurity Framework 2.0: Protect
Jan 21, 2025 12:30:55 AMAuthors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 6 Today, we dive into the third sub-function o...
NIST Cybersecurity Framework 2.0: Identify
Jan 21, 2025 12:30:48 AMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part Today, we dive into the second (originally fir...
NIST Cybersecurity Framework 2.0: Govern
Jan 21, 2025 12:30:33 AMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 4 Today’s installment of this blog is the star...
NIST Cybersecurity Framework 2.0: What’s New?
Jan 21, 2025 12:30:24 AMAuthors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...
Introduction to the NIST Cybersecurity Framework
Jan 21, 2025 12:30:04 AMAuthors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 2 This is the second in my series on cybersecu...