TheMadAdmin Cyber Security
Top Three Cybersecurity Best Practices References
Top Three Cybersecurity Best Practices References 1. National Institute of Standards and Technology (NIST) Cybersecurity Framework Reputation: Highly respected and widely adopted within the industry, particularly in the United States. NIST is a federal agency known...
Are Your Employees Enabling External Threats?
Navigating Insider Risks: Are Your Employees Enabling External Threats? Insider risks can arise from both malicious and accidental actions by employees. Accidental insiders often compromise security due to a lack of awareness, pressure to perform, poor...
6 Types of Application Security Testing You Must Know About
Friendly Summary by TheMadAdmin (AKA Dave) 6 Types of Application Security Testing You Must Know About Application security testing is essential for developing secure software. Here are six key types: Penetration Testing for the SDLC: Identifies vulnerabilities...
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
\ North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks North Korean hackers, specifically the group APT45, known for cyber espionage, are now focusing on ransomware attacks. Google-owned Mandiant reports that APT45 has targeted critical infrastructure...
KnowBe4 Hired a Fake IT Worker from North Korea
KnowBe4 Hired a Fake IT Worker from North Korea Recently, KnowBe4, a well-known cybersecurity firm, discovered they had unknowingly hired a North Korean IT worker posing as a U.S. resident. This individual used stolen identities and falsified documents to...
Incident Response Cheat Sheet
Incident Response Cheat Sheet by TheMadAdmin (AKA Dave) Step 1: Don't Panic Stay calm and adopt a problem-solving attitude. This will help you and your team respond logically and effectively to the breach. Step 2: Do Not Pay a Ransom Paying ransom often leads to more...