TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

What is Threat Intelligence?

Posted by Ryan Corey on Sep 18, 2013 7:51:12 AM

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, information assurance, Security, security training, threat intelligence

Spammed and Hacked: How Social Media Can Pose a Security Risk

Posted by Ryan Corey on Aug 26, 2013 5:12:40 AM

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, hacking, information assurance, Security, security training

Look Out IT Job Seekers! Cyber Security is the Field to Join

Posted by Ryan Corey on Aug 19, 2013 3:45:24 AM

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, average salary, cyber security, cyber war, hacking, Security, security training

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

Posted by Ryan Corey on Aug 6, 2013 4:02:44 AM

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, hacking, penetration testing, Security, security training

TrainACE and n2grate Present a Free Hacking Seminar with Product Demonstrations

Posted by Lauren Archambeault on Jun 26, 2013 11:46:47 AM

We’re excited to announce another installation of Hacker’s Breakfast, our free hacking training seminar series! This time we’ve teamed up with n2grate Government Technology Solutions to host an event with several speakers and training demonstration kiosks. Subject Matter Experts from Blue Coat and Solera Networks will be discussing mission assurance technologies and web-based security.

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, information assurance, Security, security training

Introducing the FREE CEH Study Guide

Posted by Ryan Corey on May 10, 2013 11:03:30 AM

The Certified Ethical Hacker (CEH) certification has become the benchmark for penetration testing certifications. From 2007-2011it became all the rage among the community. More and more hackers fled to the scene and started their careers off by passing the coveted CEH certification exam. There is no question that the CEH is still a highly sought after certification (especially because it was added to the DoD 8570 Directive), but its place in the field has changed. Before, the CEH was a symbol of hacking prowess, dignity, strength, wisdom, reverance, veneration, amazement (OK thats enough)...  Now, it holds its spot firmly as the preeminent baseline or entry-level hacking / penetration testing certification.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, EC-Council, exploit development, hacking, honey farm, honey net, honey pot, information assurance, Security, security training, threat intelligence

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

Posted by Ryan Corey on Feb 21, 2013 4:45:37 PM

Yes, thats correct, FREE!

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, honey farm, honey net, honey pot, information assurance, malware, malware analysis, Security

Operation Beebus Attacks Discovered by FireEye

Posted by Ryan Corey on Feb 12, 2013 5:04:53 AM

Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.

Read More

Topics: advanced penetration testing, advanced persistent threat, advanced security, aerospace, China, cyber security, cyber war, defense, FireEye, hacking, malware, Operation Beebus, Security, Trojan back doors

How Honey Pots and Honey Farming is Used in Cyber Security

Posted by Ryan Corey on Jan 29, 2013 3:45:21 AM

The term “honeypot” or, as it sometimes appears, “honey pot,” came to computer security from the world of espionage, where it referred to an agent who would be sexually available to a target. If all went as planned, the target would be compromised, either by sexual blackmail or because the relationship led the target to share secret information.

Read More

Topics: advanced persistent threat, advanced security, cyber security, honey farm, honey net, honey pot, honeyfarming, honeynetting, honeypotting, information assurance, Security, security training

The Cyber Security Battlefield Grows More Dangerous

Posted by Ryan Corey on Jan 14, 2013 10:42:28 AM

A huge portion of modern society uses some form of digital technology on a daily basis. Many conveniences on a national and personal level have been made possible due to this technology, but also opens up a Pandora's box of a whole new set of problems as well. The cyber battlefield grows more dangerous as organized hackers and other cyber threatening criminals set out to exploit the conveniences produced by the digital age for their own gain. There is an ongoing challenge, therefore, creating cyber security or defenses to protect the country from attacks; but have, on many occasions, been successfully breached to raise considerable concern even among the most savvy cyber security agencies in the world.

Read More

Topics: advanced penetration testing, advanced persistent threat, advanced security, computer training, cyber security, cyber war, hacking, information assurance, Security, security training