Welcome
Welcome New and Current Members
Glad to have Returning Members and also New Members.
Be sure to visit our website and Pay your Annual Dues. Only members that pay dues will have access to Chapter special events and online content.
Are your dues current? We are gearing up for our premier NEACS event for. More details will follow soon.
August 25th, we had a fantastic presentation. Many thanks to Professor Frederick Scholl Ph.D., CISM, CISSP, CCSP and Diane Reilly
September 29th, Thank you Jay Ferron for a very informative talk on WiFi Risks.
Many Thanks for your support.
Member News
**North East Annual Cybersecurity Summit**.... more details coming soon.
NEACS is our chapter's Premier Conference. Keep a look out for Details. Save the Dates of November 9 and 10 2022 from 12-3p est time.
CISSP Bootcamp Tickets | Eventbrite
Please have your dues paid you so you do not miss this opportunity.
CISSP BootCamp $100
Our Connecticut Chapter is working in with the NJ Chapter to offer this event to paying members. Your dues must be paid if you wish to attend the boot camp.
Please be sure to select 'Yes' to the Southern Connecticut Chapter question.
https://www.eventbrite.com/e/cissp-bootcamp-tickets-428543564337
The required book to purchase for this bootcamp can be found here: https://www.amazon.com/Official-ISC-CISSP-CBK-Reference/dp/1119789990
1st Annual International (ISC)² Chapter Conference 2022 Tickets, Thu, Dec 1, 2022 at 11:00 AM | Eventbrite
Join us for our first virtual international (ISC)² Chapter Conference with over 30 speakers!
About this event If you are an (ISC)² member, you will receive 3 CPEs for attending this conference. Members will need to fill out an online form towards the end of the event.
GitTech (Use Caution)
GitHub - s0md3v/Smap: a drop-in replacement for Nmap powered by shodan.io
Thanks Ed for a great demo. "ISC2CT do not endorse or work with the creator(s) of this content. All acknowledgement goes to them"
a drop-in replacement for Nmap powered by shodan.io - GitHub - s0md3v/Smap: a drop-in replacement for Nmap powered by shodan.io
GitHub - ShutdownRepo/Exegol: Fully featured and community-driven hacking environment
Fully featured and community-driven hacking environment - GitHub - ShutdownRepo/Exegol: Fully featured and community-driven hacking environment
GitHub - p0dalirius/Coercer: A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods.
A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 9 methods. - GitHub - p0dalirius/Coercer: A python script to automatically coerce a Windows ...
Cyber News
New NullMixer dropper infects your PC with a dozen malware families
A new malware dropper named 'NullMixer' is infecting Windows devices with a dozen different malware families simultaneously through fake software cracks promoted on malicious sites in Google Search results.
Microsoft Customer Story-Heineken creates the flexibility it needs to “Brew a Better World” with agile, scalable security solutions
Heineken has big ambitions. The company’s “Brew a Better World” initiative aims for zero waste, carbon neutrality, and positive water impact. These goals require a highly responsive management model supported by real-time information detection in a Zero Trust environment—an agile, responsive approach that the rapidly growing company felt was best achieved by discontinuing its managed service model. Heineken turned to Microsoft Security solutions to blend security with the agility it needs to brew a better world—and a brighter future.
Overheard at the SANS Security Awareness Summit 2022
Building effective and mature security awareness programs and sharing best practices were the goals of the SANS 2022 Security Awareness Summit
Shubham Sharma on Twitter: "Identifying Open ports with @nmap #infosec #cybersecurity #pentesting #oscp #informationsecurity #hacking #cissp #redteam #technology #DataSecurity #CyberSec #Hackers #tools #bugbountytips #Linux #websecurity #Network #NetworkSecurity #cybersecurityawareness https://t.co/GdMaMouwk4" / Twitter
Graphical depiction
Microsoft Looks to Enable Practical Zero-Trust Security With Windows 11
With the update, Microsoft adds features to allow easier deployment of zero-trust capabilities. Considering the 1.3 billion global Windows users, the support could make a difference.
Quantifying ROI in Cybersecurity Spend | SecurityWeek.Com
You cannot separate cost and value in business: value is used to justify cost. Business value is measured by the return on investment (ROI) from cost. By understanding current ROI it is easier to justify future cost because you know the value. But this is a problem: how do you measure or quantify ROI in cybersecurity spend?
Hackers are stealing browser cookies to glide past MFA | TechRadar
Multi-factor authentication is a great way to keep cybercriminals at bay, but some are apparently getting pretty good at bypassing this type of protection by stealing application and browser session cookies...
The Enchiridion of Impetus Exemplar
Threat Modeling Field Guide (https://shellsharks.com/threat-modeling) with 6 new Methodologies, now 13 in total!
- Microsoft Threat Modeling
- PASTA
- OCTAVE
- Trike
- LINDDUN
- VAST
- NIST SP 800-154
- OWASP TMP
- TARA
- IDDIL/ATC
- hTMM
- QTMM
- ID3
This String of Emojis Is Actually Malware
Cybersecurity researchers said they have developed a way to exploit targets just using emojis.