SEVN-X Blog

A Blog for Nerds

Featured Post

NIST Cybersecurity Framework 2.0: Identify
NIST Cybersecurity Framework 2.0: Identify
Jan 21, 2025 12:30:48 AM

Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part Today, we dive into the second (originally fir...

NIST Cybersecurity Framework 2.0: Govern
NIST Cybersecurity Framework 2.0: Govern
Jan 21, 2025 12:30:33 AM

Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 4 Today’s installment of this blog is the star...

NIST Cybersecurity Framework 2.0: What’s New?
NIST Cybersecurity Framework 2.0: What’s New?
Jan 21, 2025 12:30:24 AM

Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...

Introduction to the NIST Cybersecurity Framework
Introduction to the NIST Cybersecurity Framework
Jan 21, 2025 12:30:04 AM

Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 2 This is the second in my series on cybersecu...

So Many Frameworks
So Many Frameworks
Jan 21, 2025 12:29:53 AM

Authors: Mark Keppler | Steve Foret A Cybersecurity Frameworks Series As cybersecurity professionals, we are all trying ...

The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
Jan 21, 2025 12:29:44 AM

Author: Ryan Bradbury Introduction While Hollywood would have you believe that most high-profile 'hacks' involve highly-...

Building a Password Cracker Rig
Building a Password Cracker Rig
Jan 21, 2025 12:29:34 AM

Welcome to the SEVN-X HashBurglar Tutorial. In this multi-part blog series, we will dive into what it takes to build an ...

Surprising Stats 2023
Surprising Stats 2023
Jan 21, 2025 12:29:23 AM

The average cost of a data breach in 2023 was $4.45 million. Every year, IBM Security releases the Cost of a Data Breach...

Prospect Health (affecting Crozer Health) Ransomware attack
Prospect Health (affecting Crozer Health) Ransomware attack
Jan 21, 2025 12:29:10 AM

The Video What Should You Do If You Were Impacted by the Breach? Several steps should be taken if you were potentially i...

Protect Yourself From Social Engineering
Protect Yourself From Social Engineering
Jan 21, 2025 12:29:01 AM

Introduction Social Engineering tactics are hard to counter as they are constantly evolving in their ingenuity and they ...