I’ve enjoyed a fascinating and deeply fulfilling career in cybersecurity that has taken me all over the world, and now I want to share my experience of working in what I consider to be the most fun and exciting industry out there. That’s why I held a live event to answer questions on what it’s really like to work on digital defense’s frontline. If you’re curious about how to advance in the industry or have a friend or relative who wants to work in cybersecurity, these insights from me and from the CQURE team are for you.
Cybersecurity professionals know that they could be called on at any time to recover a user secret. For example, if an employee's profile is corrupted or user secrets have to be decrypted offline (e.g. during analysis of the forensic image of the operating system).
Find out about some tools capable of decrypting secrets protected using DPAPI and get an outline of how to use them.
This time we would like to invite you to the 56th Hacks Weekly episode. We will focus on a live memory dump and RAM Capturer software.Join us to learn how to perform live memory dumps that can be used in various forensic activities.
Welcome to another episode of the CQURE Hacks Weekly series. This time we will focus on insecure data storage. We're going to learn what insecure data storage is, how it can be exploited and what are the risks and consequences of insecure data storage.
As with everything that you might find online, it is necessary to verify the information you have. The same goes for Cybersecurity-related information. To ensure the correctness of findings you should cross-check them with other tools/services available to you.