Remove cybersecurity-writing-course
article thumbnail

A Short Cybersecurity Writing Course Just for You

Lenny Zeltser

My new writing course for cybersecurity professionals teaches how to write better reports, emails, and other content we regularly create. It captures my experience of writing in the field for over two decades and incorporates insights from other community members. Why “hack”?

article thumbnail

How to Write Good Incident Response Reports

Lenny Zeltser

Creating an informative and readable report is among the many challenges of responding to cybersecurity incidents. This blog highlights my advice on writing such incident reports. In general, people want to know the following about a cybersecurity incident: What happened and when? Download it and take a look.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Critical Fortinet FortiOS bug CVE-2024-21762 potentially impacts 150,000 internet-facing devices

Security Affairs

The issue is an out-of-bounds write vulnerability that can be exploited by sending specially crafted HTTP requests to vulnerable instances. A out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.” reads the advisory.

Internet 138
article thumbnail

How You Can Write Better Threat Reports

Lenny Zeltser

Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. I’m happy to share what I’ve learned over the years about writing effective threat reports in the following 36-minute video. How should you decide what details to include?

article thumbnail

A New Cybersecurity “Social Contract”

Schneier on Security

The devil is in the details, of course, but he’s 100% right when he writes that the market cannot solve this: that the incentives are all wrong. While he never actually uses the word “regulation,” the future he postulates won’t be possible without it. Or the surveillance capitalists, for that matter.

article thumbnail

Learning Malware Analysis and Cybersecurity Writing Online

Lenny Zeltser

You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. Cybersecurity Writing. Malware Analysis.

Malware 105
article thumbnail

Speakers Censored at AISA Conference in Melbourne

Schneier on Security

It's cracking down on the whistleblowers and reporters who write their stories. Of course, now everyone is writing about the story. I am at this conference, speaking on Wednesday morning (today in Australia, as I write this). ACSC used to have its own government cybersecurity conference. I hope it's the last.