Ready to Start Your Career?

Monday Mix: Stop Adversaries from Exfiltrating Data and Extorting Businesses

Sara Faradji's profile image

By: Sara Faradji

June 21, 2022

Hi everyone!

Want to level up your exploitation, detection, networking, and mitigation skills to keep pace with today's most critical security threats? Check out this week's content to gain the knowledge and hands-on training you'll need to succeed in numerous cybersecurity job roles!

New Campaign

Imagine a scenario where an adversary steals your business’ data and threatens to expose or destroy it unless you pay a massive sum of Bitcoin. This is the classic behavior of notorious threat actor, FIN10, who has stolen valuable data from casinos and mining companies since 2013.

Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.

Read 📖 More

Learn about how these courses can benefit you and your security team in our new article.

Critical Disruptions: New Exfiltration and Extortion Threat Actor Campaign

More New Courses

Adversaries can leverage the OpenSSL Infinite Loop flaw (CVE-2022-0778) to cause major damage, including a denial-of-service (DOS) attack. Can you exploit this vulnerability in a matter of seconds? Try it now in our new course, where you can test your skills in a secure lab environment!

CVE Series: OpenSSL Infinite Loop (CVE-2022-0778)

Cybrary is proud to release the first of 18 courses that each focus on one of the CIS Critical Security Controls covered in version 8. Enroll now to explore how to maintain an asset inventory as you develop organizational best practices for mitigating risks.

CIS Critical Security Control 1: Inventory and Control of Enterprise Assets

New Podcast

Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! In our new episode of 401 Access Denied, get expert advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.

Start 🎧 listening ▶️

Highlights from Verizon's 2022 Data Breach Investigations Report

Have a great week!

Schedule Demo

Let's build your cybersecurity career together

Accelerate in your role, prepare for certifications, and develop cutting edge skills with the most in-demand training in the industry.

2,000+learning activities led by highly experienced cybersecurity professionals