
By: Sara Faradji
June 21, 2022
Monday Mix: Stop Adversaries from Exfiltrating Data and Extorting Businesses

By: Sara Faradji
June 21, 2022
Hi everyone!
Want to level up your exploitation, detection, networking, and mitigation skills to keep pace with today's most critical security threats? Check out this week's content to gain the knowledge and hands-on training you'll need to succeed in numerous cybersecurity job roles!
New Campaign
Imagine a scenario where an adversary steals your business’ data and threatens to expose or destroy it unless you pay a massive sum of Bitcoin. This is the classic behavior of notorious threat actor, FIN10, who has stolen valuable data from casinos and mining companies since 2013.
Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.
Read 📖 More
Learn about how these courses can benefit you and your security team in our new article.
Critical Disruptions: New Exfiltration and Extortion Threat Actor Campaign
More New Courses
Adversaries can leverage the OpenSSL Infinite Loop flaw (CVE-2022-0778) to cause major damage, including a denial-of-service (DOS) attack. Can you exploit this vulnerability in a matter of seconds? Try it now in our new course, where you can test your skills in a secure lab environment!
Cybrary is proud to release the first of 18 courses that each focus on one of the CIS Critical Security Controls covered in version 8. Enroll now to explore how to maintain an asset inventory as you develop organizational best practices for mitigating risks.
CIS Critical Security Control 1: Inventory and Control of Enterprise Assets
New Podcast
Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! In our new episode of 401 Access Denied, get expert advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.
Start 🎧 listening ▶️
Highlights from Verizon's 2022 Data Breach Investigations Report
Have a great week!
Let's build your cybersecurity career together
Accelerate in your role, prepare for certifications, and develop cutting edge skills with the most in-demand training in the industry.

2,000+learning activities led by highly experienced cybersecurity professionals