airforceteacher.bsky.social
airforceteacher.bsky.social
@airforceteacher.bsky.social
Still time to sign up for SANS SEC504 in the Crescent City next month!!

www.sans.org/cyber-securi...
SANS New Orleans 2025 | Cyber Security Training
SANS New Orleans 2025 (February 17-22) offers hands-on cybersecurity training taught by top industry practitioners. Attend Live Online or in New Orleans, LA.
www.sans.org
January 14, 2025 at 10:33 PM
Reposted by airforceteacher.bsky.social
🤓 Calling all tech enthusiasts! Discover the intricate world of secure coding in "Alice and Bob Learn Secure Coding." Pre-order now and secure your copy on launch day!
shehackspurple.ca/bo...
‘Alice and Bob Learn’ Book Series
Learn application security from the very start, with this comprehensive and approachable guide!
shehackspurple.ca
January 12, 2025 at 4:17 PM
Reposted by airforceteacher.bsky.social
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
Ransomware abuses Amazon AWS feature to encrypt S3 buckets
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) known only to the threat actor, demanding ransoms to receive the decryption key.
www.bleepingcomputer.com
January 13, 2025 at 3:27 PM
Reposted by airforceteacher.bsky.social
Killer lineup! Can’t wait to attend.

If you are into reverse engineering, check out the new Re-Verse conference, launching in February! The team behind it is incredible. This is going to be the new Infiltrate.
January 13, 2025 at 2:09 PM
Want to spin up on AD attack techniques? Want help setting up a test range? Check out www.sans.org/webcasts/int...
Intro to Kerberos and Common AD Privesc Attacks with Empire | SANS Intitute
Intro to Kerberos and Common AD Privesc Attacks with Empire | SANS Intitute
www.sans.org
January 4, 2025 at 5:22 PM
Congratulations to the winning in person team the SEC504 CTF at SANS Golden Gate!
November 24, 2024 at 4:32 PM
Reposted by airforceteacher.bsky.social
There's currently what looks to be a credential stuffing attack ongoing against Fortinet SSLVPN devices. Seeing a lot of failed login attempts on port 10443. It's unclear where the credentials came from, but they're not in any public database from what I can see.
November 12, 2024 at 11:55 PM