Search
Login Register
  • FREE SAMPLE CONTENT
  • Books
    • CCIE | CCNP | CCNA
    • DevNet
  • Blog
  • Support
CCIEin8Weeks
Log in Sign up

Login/Sign Up

Courses Favorites 0

Search

Menu

  • Books
    • CCIE | CCNP | CCNA
    • DevNet
  • Blog
  • Support
CCIEin8Weeks > Blog

The Future of Ransomware: JBS Ransomware 2021 Explained

06
Jun
JBS Cyberattack Explained
Posted in: Cybersecurity ,
Read more

The Shifting Landscape of Ransomware Attacks

26
Apr
Axis of REvil - The shifting landscape of ransomware
Posted in: Cybersecurity ,
Read more

Pulse Secure Connect PCS VPN Hack Explained

23
Apr
Pulse Secure VPN Hack Explained
Posted in: Cybersecurity ,
Read more

Codecov Supply Chain Attack Explained

19
Apr
codecov supply chain attack explained
Posted in: Cybersecurity ,
Read more

Ethical Hacking Explained | The Scope, Goals, and How You Can Become One

17
Apr
ethical hacking explained
Posted in: Cybersecurity ,
Read more

Cyber Security Basic Terms and Concepts for Beginners Part 2

12
Apr
Cyber Security Basic Terms and Concepts for Beginners part 2
Posted in: Cybersecurity ,
Read more

Cyber Security Basic Terms and Concepts for Beginners

05
Apr
cyber security basic terms and concepts for beginners
Posted in: Cybersecurity ,
Read more

Top 5 Cyber Security Unicorns in 2021

31
Mar
Top Cyber Security Unicorns IPO in 2021
Posted in: Cybersecurity ,
Read more

When the Hackers Got Hacked: SolarWinds Hack Explained

26
Mar
solarwinds hack explained
Posted in: Cybersecurity ,
Read more

The F5 Big-IP Hack Explained

21
Mar
f5 big-ip hack
Posted in: Cybersecurity ,
Read more
  • 1
  • 2
  • 3
  • …
  • 24
  • Next
best-selling-cisco-study-guides_cciein8weeks

JBS Cyberattack Explained
The Future of Ransomware: JBS Ransomware 2021 Explained

Today, we live in a world where there is nothing, and I mean nothing, off the limits for cyberattacks and particularly ransomware attacks. Our hospitals, our universities, oil pipelines, and now even our meat is under cyberattack. The cyberattack that flattened the IT operations at JBS Foods over the weekend turns out was a ransomware […]

Axis of REvil - The shifting landscape of ransomware
The Shifting Landscape of Ransomware Attacks

Ransomware has been a growing menace for years, but there has been a marked increase, during the recent months, in sophistication and level of innovation in this portion of the cybercrime underbelly. If you didn’t know, cybercrime comes in many different types, such as email and internet fraud, identity theft, financial theft like someone stealing […]

Pulse Secure VPN Hack Explained
Pulse Secure Connect PCS VPN Hack Explained

It’s time to check your Pulse. I mean your Pulse Connect Secure VPN appliance. Hackers have been exploiting several previously known and one zero-day vulnerabilities affecting Pulse Connect Secure aka PCS VPN appliances. They are targeting defense, government, and financial organizations around the world. According to FireEye, several threat actors have been exploiting the four […]

codecov supply chain attack explained
Codecov Supply Chain Attack Explained

OK, we now have another supply chain attack that could become the next big hack. When April fools’ jokes were being published online, one company known as Codecov discovered something that was far from a joke. So, who is Codecov? Codecov is one of the many DevOps tools out there. It provides hosted testing reports […]

ethical hacking explained
Ethical Hacking Explained | The Scope, Goals, and How You Can Become One

So, what is Ethical Hacking? Well, it is hacking ethically. OK, that was not helpful. There are two types of hacking, white hat hacking, black hat hacking. They use similar tools and have similar goals, so then what is the difference. Well, there is one big difference and that has to do with consent or […]

5001 Great America Parkway, Suite #222, Santa Clara, CA 95054, USA

+1 (408) 256-1814

© 2014-2023 CCIEin8Weeks.com. All Rights Reserved. CCIEin8Weeks is not affiliated with any vendor. All trademarks are property of their respective owners. TOS|Privacy