SEVN-X Blog
A Blog for Nerds
Featured Post
Introduction to the NIST Cybersecurity Framework
Authors: Mark Keppler | Steve Foret Cybersecurity Frameworks Series, part 2 This is the second in my series on cybersecu...
So Many Frameworks
Authors: Mark Keppler | Steve Foret A Cybersecurity Frameworks Series As cybersecurity professionals, we are all trying ...
The Smish-and-Grab – Latest SMS & Phishing Trends in 2024
Author: Ryan Bradbury Introduction While Hollywood would have you believe that most high-profile 'hacks' involve highly-...
Building a Password Cracker Rig
AUTHOR: VitALITY KOVALCHUK Welcome to the SEVN-X HashBurglar Tutorial. In this multi-part blog series, we will dive into...
Surprising Stats 2023
The average cost of a data breach in 2023 was $4.45 million. Every year, IBM Security releases the Cost of a Data Breach...
Prospect Health (affecting Crozer Health) Ransomware attack
The Video What Should You Do If You Were Impacted by the Breach? Several steps should be taken if you were potentially i...
Protect Yourself From Social Engineering
Introduction Social Engineering tactics are hard to counter as they are constantly evolving in their ingenuity and they ...
How To Effectively Communicate Cybersecurity To The Board
It has become increasingly important to have cybersecurity initiatives receive board recognition and CISOs must be able ...
Password Cracking 101
Who doesn't love complex passwords?... Hackers!!! Let me explain, everyone knows that passwords are the most used method...
Alphv (Blackcat) Using Malicious Windows Drivers
TL; DR: Affiliates of the ALPHV ransomware group (also referred to as Blackcat) have been observed using malicious, but ...