Resources


LEARN MORE




Blog Posts

L33T or Lame: A Hacker Tool Review

“Top 10 Gifts for the Hacker in Your life” articles are incredibly common. But how do you know if some of the tools listed are actually worthwhile?  We recently sat down with two of our security engineers to talk about different gadgets and tools of the trade on this week’s ...

Hacking the Holiday: A Hacker’s Gift Guide

Are you looking for the perfect gift for the hacker in your life? We’ve scoured our amazon purchase histories and here’s what we think would be great gifts for any hacker in your life. Just click on the images or the titles for a direct link to the amazon listing. ...

How To Create A Threat Model in 7 Easy Steps With Our Template

How To Create A Threat Model in 7 Easy Steps With Our Threat Model Template Our team here at Alias is made up of hackers turned security professionals. In fact, they probably learned how to type before learning how to write. When you hire us for a pen test, we’re ...

Learn to prevent and respond to ransomware

Ransomware has been a problem since 1989, and it’s not getting better. In fact, every eleven to fourteen seconds, a new company falls victim to this problem. Ransomware costs organizations around $20-Billion annually. But it’s not just a company problem, individuals fall victim to this threat as well. You need ...

What is digital forensics? Your new fingerprint.

When you think forensics, you probably imagine fingerprint and blood sample analysis. Which is pretty close to what digital forensics is. Change out the fingerprint for a computer and you’ve basically got it. Digital forensics is the scientific approach to performing data recovery and analysis of a digital device. A ...

Why Your Business Needs Cyber Security Awareness Training

Ever wonder if you should bother with the cost and time needed for security awareness training? Some industries are legally required to host security awareness training (like banking); but quite a few industries aren’t required to have employee training. Here are a few reasons why you should host cyber security ...



Workshop Videos

Managing an incident with SentinelOne and Alias

2020 really felt like the year of data breaches, huh? With the rate companies are being attacked, it’s required to know how to manage an incident. Well here’s your chance. Gain some new knowledge by viewing this online workshop! Alias and SentinelOne have partnered together to bring you insight on ...

Pen testing on a budget workshop

Money’s tight, but that doesn’t mean you have to lower your cyber security standards. Learn how you can pen test on a budget. Watch the workshop above for a look into how you can monitor your small business network. And if you have questions when you’re done?

Network monitoring as a small business workshop

Learn how you can protect your business from hackers by monitoring your network traffic. Being a small business doesn’t mean you can’t secure yourself. We know it can be intimidating to try and figure out your cyber security if you aren’t familiar with it. That’s why we’re here. Securing your ...



Notices

Inc. 5000 Recognizes Alias Infosec as One of the Fastest-Growing Companies in America

Inc. Magazine, based in New York, recently announced that Alias Infosec, a leading cybersecurity and digital forensics company, is No. 2,068 on its annual Inc. 5000 list, the most prestigious ranking of the nation’s fastest-growing private companies.  “We are honored to receive national recognition on the Inc. 5000 list for ...

The Colonial Pipeline Hack and OT Security

Due to the cybersecurity issue at Colonial Pipeline, the Colonial Hack, most of the fuel supply to the east coast has been disrupted for more than a week. It has been reported that the company paid five million dollars in ransom and received decryption keys. Darkside, the hacking group attributed ...

Colonial pipeline ransomware overview

Every day it becomes more apparent that nobody is immune to ransomware From mom and pop shops to the largest US refined products pipeline system, that supplies gas to most of the east coast. Last week the Colonial pipeline was infected with ransomware that caused the company to entirely shut ...

Exchange zero-day detection

Exchange zero-day vulnerability detection If you think you were impacted from the Exchange zero-day vulnerability, you can run the list of IPs below in Virus Total to search for any potential indicators of compromise. PowerShell scripts for hunting threats: Download them here. NMAP script for hunting vulnerable servers and validating ...

SolarWinds and FireEye Security Exposure: A Note to Alias Clients

SolarWinds and FireEye Security Exposure: A Note to Alias Clients Alias was not directly impacted by the recent attack or exposures disclosed by FireEye on December 8, 2020. We do not utilize SolarWinds as part of our internal infrastructure and have maintained the integrity of our systems, services, data, and ...



Listen to our podcast that’s all about cybersecurity.