Yaksas Security
Subscribe
Sign in
Home
Red Team Training
Cyber Safety Initiatives
GitHub
Archive
About
Latest
Top
Where Should a CISO Report in an Organization?
Where a CISO reports affects cybersecurity success. Explore various reporting structures, their pros, cons, and the key to a successful cybersecurity…
Oct 5, 2024
•
Yaksas Security
How CISOs and Corporate Audit Teams Can Drive Cybersecurity Success
A CISO partnering with the audit team can drive executive support for cybersecurity programs, secure funding, and strengthen organisational risk…
Oct 2, 2024
•
Yaksas Security
CERT-In: The first responders of the Indian cyberspace
This post is part of our series Cybersecurity Chronicles from India. This one is all about the The Indian Computer Emergency Response Team (CERT-In).
Oct 1, 2024
•
Yaksas Security
September 2024
6 Ways to Cover Your Device's Camera
Have you ever wondered that somebody might be watching you though your device's camera? Stay safe with these 6 device camera cover hacks.
Sep 30, 2024
•
Yaksas Security
Why Changing Your Password Every 90 Days May Soon Be Outdated
Are organisations shifting from frequent password changes to longer passwords? Learn about modern trends in password management and how leading…
Sep 29, 2024
•
Yaksas Security
PoshC2: A Red Teamer's Notes
A quick reference guide for using PoshC2, a post-exploitation framework, during penetration testing and red teaming engagements.
Sep 29, 2024
•
Yaksas Security
The Three Command and Control Tiers
This post covers the three command and control tiers commonly used during red team and adversary emulation engagements.
Sep 29, 2024
•
Yaksas Security
Introduction to MITRE ATT&CK Framework
This post covers basics of MITRE ATT&CK framework. One of the use cases of ATT&CK is Adversary Emulation exercises.
Sep 29, 2024
•
Yaksas Security
What is Adversary Emulation?
Learn about adversary emulation. This post is part of our course Red Team Adversary Emulation: Mimicking a real-world cyber attack
Sep 29, 2024
•
Yaksas Security
Red Team Operations Attack Lifecycle
The nine-step process of conducting red team and adversary emulation exercises.
Sep 29, 2024
•
Yaksas Security
Goodbye Passwords: Hello Passkeys
Discover why passkeys are revolutionizing security, offering a safer and easier alternative to passwords, backed by major organizations and industry…
Sep 28, 2024
•
Yaksas Security
BlueBorne: Turn that Bluetooth off
Information on BlueBorne flaws in Bluetooth capability of mobile devices. They make it easy for attackers to break into any mobile device.
Sep 27, 2024
•
Yaksas Security
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts