Welcome
**Welcome**
Welcome! Thank you for your Support.
Hello Chapter!
Welcome New Members. Thank you to returning and current members. Thank you for your support! Thank you to our presenter for an informative session. Also, thank you to our GitTech presenter. Always a great demo. Our Chapter grows with your support. Get Involved
Member News
Computing Programs | Quinnipiac University | Quinnipiac University
Quinnipiac University's computing-based undergraduate and graduate programs prepare you for a range of highly employable career opportunities in the rapidly growing and exciting fields of computing and information technology.
GitTech (Use Caution)
GitHub - socfortress/iris-cortexanalyzer-module: IRIS module to run Cortex Analyzer
IRIS module to run Cortex Analyzer. Contribute to socfortress/iris-cortexanalyzer-module development by creating an account on GitHub.
GitHub - socfortress/Playbooks: Playbooks for SOC Analysts
This repository contains all the Incident Response Playbooks and Workflows of Company's SOC.
Each folder contains a Playbook that is broken down into 6 section as per NIST - 800.61 r2
GitHub - OWASP/RiskAssessmentFramework: The Secure Coding Framework
The Secure Coding Framework . The OWASP Risk Assessment Framework consist of Static application security testing and Risk Assessment tools. By using OWASP Risk Assessment Framework's Static Appilication Security Testing tool Testers will be able to analyse and review their code quality and vulnerabilities without any additional setup. OWASP Risk Assessment Framework can be integrated in the DevSecOps toolchain to help developers to write and produce secure code.
Cyber News
China's Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected
A China-based state-sponsored group, Volt Typhoon, has stealthily infiltrated critical infrastructure organizations in the U.S. and Guam.
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
Chinese state-sponsored actor Volt Typhoon is using stealthy techniques to target US critical infrastructure, conduct espionage, and dwell in compromised environments.
New ZIP domains spark debate among cybersecurity experts
Cybersecurity researchers and IT admins have raised concerns over Google's new ZIP and MOV Internet domains, warning that threat actors could use them for phishing attacks and malware delivery.
Two-thirds of all 2022 breaches resulted from spear phishing | Computer Weekly
Research by Barracuda Networks has found that, despite the low volume of spear-phishing attempts, the attacks are highly successful and have major consequences
Advanced Phishing Attacks Surge 356% in 2022 - Infosecurity Magazine
Perception Point has observed a 356% growth in the number of advanced phishing attacks attempted by threat actors in 2022.
KeePass Flaw Exposes Master Passwords - Infosecurity Magazine
A vulnerability has been discovered in the KeePass password management software (v2.X), allowing an attacker to dump the master password from the program’s memory.