SEVN-X Blog

I N S I D E   T H E   P E R I M E T E R  

 

 

 

Latest Stories

NIST Cybersecurity Framework 2.0: What’s New?
NIST Cybersecurity Framework 2.0: What’s New?

Authors: Steve Foret | Mark Keppler Cybersecurity Frameworks Series, part 3 With the NIST releasing CSF 2.0, the first u...

Jan 21, 2025 12:30:24 AM
NIST Cybersecurity Framework: What It Is, How It Works, and Whether It’s Right for You
NIST Cybersecurity Framework: What It Is, How It Works, and Whether It’s Right for You

Authors: Mark Keppler | Steve Foret Who Should Read This If you’re evaluating whether to adopt NIST CSF, just starting i...

Jan 21, 2025 12:30:04 AM
So Many Frameworks: Which Cybersecurity Framework Should Your Organization Use?
So Many Frameworks: Which Cybersecurity Framework Should Your Organization Use?

Authors: Mark Keppler | Steve Foret Who Should Read This If you’re evaluating cybersecurity frameworks for the first tim...

Jan 21, 2025 12:29:53 AM
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024

Author: Ryan Bradbury Introduction While Hollywood would have you believe that most high-profile 'hacks' involve highly-...

Jan 21, 2025 12:29:44 AM
Building a Password Cracker Rig
Building a Password Cracker Rig

AUTHOR: VitALITY KOVALCHUK Welcome to the SEVN-X HashBurglar Tutorial. In this multi-part blog series, we will dive into...

Jan 21, 2025 12:29:34 AM
Surprising Stats 2023
Surprising Stats 2023

The average cost of a data breach in 2023 was $4.45 million. Every year, IBM Security releases the Cost of a Data Breach...

Jan 21, 2025 12:29:23 AM
Prospect Health (affecting Crozer Health) Ransomware attack
Prospect Health (affecting Crozer Health) Ransomware attack

The Video What Should You Do If You Were Impacted by the Breach? Several steps should be taken if you were potentially i...

Jan 21, 2025 12:29:10 AM
Protect Yourself From Social Engineering
Protect Yourself From Social Engineering

Introduction Social Engineering tactics are hard to counter as they are constantly evolving in their ingenuity and they ...

Jan 21, 2025 12:29:01 AM
How To Effectively Communicate Cybersecurity To The Board
How To Effectively Communicate Cybersecurity To The Board

It has become increasingly important to have cybersecurity initiatives receive board recognition and CISOs must be able ...

Jan 21, 2025 12:28:51 AM
Password Cracking 101
Password Cracking 101

Who doesn't love complex passwords?... Hackers!!! Let me explain, everyone knows that passwords are the most used method...

Jan 21, 2025 12:28:40 AM

In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.

This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.

This is where observation turns into understanding.