SEVN-X Blog

A Blog for Nerds

Featured Post

Building a Password Cracker Rig
Building a Password Cracker Rig
Jan 21, 2025 12:29:34 AM

AUTHOR: VitALITY KOVALCHUK Welcome to the SEVN-X HashBurglar Tutorial. In this multi-part blog series, we will dive into...

Surprising Stats 2023
Surprising Stats 2023
Jan 21, 2025 12:29:23 AM

The average cost of a data breach in 2023 was $4.45 million. Every year, IBM Security releases the Cost of a Data Breach...

Prospect Health (affecting Crozer Health) Ransomware attack
Prospect Health (affecting Crozer Health) Ransomware attack
Jan 21, 2025 12:29:10 AM

The Video What Should You Do If You Were Impacted by the Breach? Several steps should be taken if you were potentially i...

Protect Yourself From Social Engineering
Protect Yourself From Social Engineering
Jan 21, 2025 12:29:01 AM

Introduction Social Engineering tactics are hard to counter as they are constantly evolving in their ingenuity and they ...

How To Effectively Communicate Cybersecurity To The Board
How To Effectively Communicate Cybersecurity To The Board
Jan 21, 2025 12:28:51 AM

It has become increasingly important to have cybersecurity initiatives receive board recognition and CISOs must be able ...

Password Cracking 101
Password Cracking 101
Jan 21, 2025 12:28:40 AM

Who doesn't love complex passwords?... Hackers!!! Let me explain, everyone knows that passwords are the most used method...

Alphv (Blackcat) Using Malicious Windows Drivers
Alphv (Blackcat) Using Malicious Windows Drivers
Jan 21, 2025 12:28:32 AM

TL; DR: Affiliates of the ALPHV ransomware group (also referred to as Blackcat) have been observed using malicious, but ...

Getting Started with Security Governance for SMBs
Getting Started with Security Governance for SMBs
Jan 21, 2025 12:28:24 AM

Introduction Look, I get it - Security Governance isn’t the sexy part of Information Security. Unless of course you are ...

Pros vs. Joes: Battling The Cyber Gap
Pros vs. Joes: Battling The Cyber Gap
Jan 21, 2025 12:28:16 AM

Introduction One issue that has cropped up over the last decade in the field of cybersecurity is the “cyber skill gap.” ...

An Introduction to Zero Trust
An Introduction to Zero Trust
Jan 21, 2025 12:28:09 AM

What is Zero Trust? Zero Trust is a security model that has gained popularity in recent years due to its effectiveness i...