Remove cybersecurity-writing-course
article thumbnail

A Short Cybersecurity Writing Course Just for You

Lenny Zeltser

My new writing course for cybersecurity professionals teaches how to write better reports, emails, and other content we regularly create. It captures my experience of writing in the field for over two decades and incorporates insights from other community members. Why “hack”?

article thumbnail

Critical Fortinet FortiOS bug CVE-2024-21762 potentially impacts 150,000 internet-facing devices

Security Affairs

The issue is an out-of-bounds write vulnerability that can be exploited by sending specially crafted HTTP requests to vulnerable instances. A out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.” reads the advisory.

Internet 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A New Cybersecurity “Social Contract”

Schneier on Security

The devil is in the details, of course, but he’s 100% right when he writes that the market cannot solve this: that the incentives are all wrong. While he never actually uses the word “regulation,” the future he postulates won’t be possible without it. Or the surveillance capitalists, for that matter.

article thumbnail

How You Can Write Better Threat Reports

Lenny Zeltser

Writing about cybersecurity threats, such as phishing campaigns, malware infections, and attack groups, is challenging for many reasons. I’m happy to share what I’ve learned over the years about writing effective threat reports in the following 36-minute video. How should you decide what details to include?

article thumbnail

Learning Malware Analysis and Cybersecurity Writing Online

Lenny Zeltser

You can now take my malware analysis and cybersecurity writing courses online in two formats at SANS Institute, depending on how you prefer to learn: OnDemand: Self-paced, recorded training with four months of access to course materials and labs. Cybersecurity Writing. Malware Analysis.

Malware 106
article thumbnail

Speakers Censored at AISA Conference in Melbourne

Schneier on Security

It's cracking down on the whistleblowers and reporters who write their stories. Of course, now everyone is writing about the story. I am at this conference, speaking on Wednesday morning (today in Australia, as I write this). ACSC used to have its own government cybersecurity conference. I hope it's the last.

article thumbnail

6 tips for effective security job postings (and 6 missteps to avoid)

CSO Magazine

That may matter more today than ever before, given how much movement there is in the labor market overall and, more specifically, how fierce competition is for cybersecurity talent. Of course, writing a compelling job posting isn’t an exact science, but Smart seems to have a knack for it.

CISO 103