Ten tips for aspiring cybersecurity professionals
· β˜• 7 min read
From time to time, a junior security specialist, or someone looking to break into cybersecurity, asks me for a few professional tips. Since I tend to repeat some of these recommendations quite often, and I believe they could be useful to almost any junior security professional, I decided to put together a list of ten tips that I consider the most important for a meaningful, effective, and satisfying career in cybersecurity...

SANS ISC Diary - Another day, another malicious JPEG
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look at a recent malspam campagin delivering a multi-stage infection chain involving a JScript downloader, WMI-spawned PowerShell, and an in-memory .NET assembly extracted from a JPEG file…

SANS ISC Diary - Use of CSS stuffing as an obfuscation technique?
· β˜• 1 min read
A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we’ll take a look at a phishing page, which - probably as an obfusctaion technique - contained a large amount of garbage CSS code…