SEVN-X Blog
A Blog for Nerds
Featured Post
NIST Cybersecurity Framework 2.0: Recover
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 9 Today, we will take a deep dive into the REC...
Crowdstrike Bricks Windows
Matt Barnett sits down with NBC10 to talk about how an update from CrowdStrike on Friday, July 19 brought down millions ...
Voice Cloning: The Rising Threat of Audio Deepfakes in Impersonation Scams
Author: Stephen Bondurich Introduction By now, most of us know how to handle a suspicious phone call from a stranger. We...
NIST Cybersecurity Framework 2.0: Respond
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 8 Today, we will take a deep dive into the RES...
Cooking for Hashcat: Improving Old Recipes and Exploring New Ones
Recorded at Grassr00tz 2024 in Appleton, Wisconsin, SEVN-X's Vitaliy "Kelly" Kovalchuk presents on improving password cr...
NIST Cybersecurity Framework 2.0: Detect
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 7 Today, we will take a deep dive into the DET...
NIST Cybersecurity Framework 2.0: Protect
Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 6 Today, we dive into the third sub-function o...
NIST Cybersecurity Framework 2.0: Identify
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part Today, we dive into the second (originally fir...
NIST Cybersecurity Framework 2.0: Govern
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 4 Today’s installment of this blog is the star...
NIST Cybersecurity Framework 2.0: What’s New?
Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...