Press & News
Building Your Knowledge Base: Get Up to Speed on Regex and Linux with Capture The Packet
Are you looking to get up to speed on Linux and regular expressions? With Capture The Packet’s new trainers, you can quickly learn the basics of both systems.
Slay the Paper Tiger: How Capture The Packet Can Help
resume, it’s hard to be sure that the individual can back up their claims. You’re not alone – HR professionals are struggling to determine which candidates have real technical ability and who is just great on paper. That’s where Capture The Packet comes in.
Let Us Take the Stress Out of Your Next CTF Event
Are you looking to host a Capture The Flag event but don’t know where to start? Look no further! Our team of experienced professionals can take the hassle out of planning and executing your physical or virtual CTF event. We will handle everything from providing the platform to managing the scoreboard, so all you have to worry about is enjoying the event. Contact us today and let us help make your next CTF event a success!
Fighting Fraud: Don’t Fall Victim to Malware Scams
In today’s digital realm, it is essential to remain vigilant against potential cyber threats and scams. Malware scams are on the rise as criminals gain access to confidential data such as personal information, banking details, and other sensitive intel. This blog post will give you an in-depth understanding of what malware attacks are, how they work and the actions you can take for protection.
Fighting Fraud: Tips for Avoiding Common Advance Fee Scams
Advance fee fraud scams are becoming increasingly common. Every day, hardworking individuals and businesses are being taken advantage of by criminals who promise goods, services or money in return for an upfront fee. Unfortunately, these fees often turn out to be nothing more than a way for the perpetrators to steal money from unsuspecting victims. By learning how to recognize and protect yourself from these scams, you can avoid becoming a victim of this type of fraud.
Don’t Fall for the Trap: Recognizing Pay-to-Play Business Scams
The best way to protect yourself from pay-to-play business scams is to be aware of the warning signs and know what actions to take if you suspect a scam. Here, we’ll help you recognize pay-to-play business scams and provide tips on how to avoid them.
Gift Card Bar Code Scams
Read about the newest scam this holiday season involving gift card bar codes.
Aries Security Joins Forces With Lockheed Martin & UKI To Accelerate Skills Development For U.S. Army’s Civilian Cyber Workforce
Aries Security is proud to support the U.S. Army’s civilian cyber personnel in their efforts to maintain cyber readiness and train for 21st century challenges. We have recently been selected as the primary content provider for the U.S. Army Career Civilian Management Activity (ACCMA) program for cyber personnel. With ACCMA, the Army will be better equipped to ensure that its civilian cyber workforce is ready to meet the demands of the modern world.
Fighting Fraud: Common Bank Scams
It seems like every other day, there’s a new story in the news about someone being scammed out of their life savings by a clever bank scheme. It’s important to be aware of the most common types so that you can protect yourself.
Aries Security at DEF CON 30
Aries Security at DEF CON 30Every year, Aries Security sponsors the Packet Hacking Village at DEF CON. We help provide education and training to the public at no charge. In addition, our flagship product, Capture The Packet, provides a platform for the best hackers in...
Capture The Packet 2022!
Capture The Packet 2022!Hey everybody!!! We have info on this year's Capture The Packet competition at DEF CON nailed down, and here are the details! THE SCHEDULE IS: Friday: 10:30am - 6:00pm Saturday: 10:30am - 6:00pm Sunday: 10:00am Now here's how that breaks down....
Fighting Fraud: The SCAM Framework
This is the first in a series of articles talking about common scams and fraud tactics, and how to avoid being fooled. Every day, scammers from across the globe target people to try and get them to pay up. In future articles, we’ll dive into some of the specific tactics and techniques these criminals use: today, we’re going to give you a simple framework to help you stay safe online.
Capture The Packet Build 4.7.3
Build 4.7.3 of our flagship product, Capture The Packet, is live! Here’s what’s new in this update.
Controlled Folder Access for the Win!
Our founder and CEO, Brian Markus, recently wrote up an encounter he had with Windows Defender. It turns out that controlled folder access works great, and with a little research, you can see exactly what it’s doing and why.
Presenting: Capture The Packet Micro!
We’ve been working hard on our latest prototype, and we’re proud to formally present Capture The Packet Micro! All the CTP features you rely on in a new, micro-size package. Check out our latest offering!
BITB Attack Demo
There’s a new technique on the internet designed to fool you into giving up your credentials. It’s called the browser-in-the-browser attack, and if you’re not paying attention, you might just give away the keys to the kingdom.
What Do Cyber Protection Teams Do?
Infosec is a booming field full of opportunity. Titles like “threat hunter” and “cyber operator” sound very exciting. But what do these jobs really entail?
Staying Safe Online, Part 4
Welcome to the fourth part of our series on internet safety. Previously, we’ve touched on general tips and social media, Google privacy and online dating, and Windows and mobile wallets. Here, we’ll give you some pointers on VPNs and smartphone use.
Staying Safe Online, Part 3
Welcome to the third part of our series on staying safe online. We’ve covered general tips and social media, as well as Google privacy and online dating. In this article, we’ll dive into Windows settings that can help keep you safe and cover the basics of mobile wallets.
Capture The Packet Event Feedback
We recently performed a demo for a major aerospace and defense contractor. Unfortunately, per their corporate communications policy, we cannot disclose their name or use their company logo. However, we are permitted to share employees’ anonymized comments publicly.