Instagram

Industry Certification with CompTIA: OPK12 Webinar

Join Cyber Florida and CompTIA for an engaging and informative webinar designed to help educators navigate the evolving industry certification landscape. This session will explore the importance of industry certifications in preparing students for successful IT careers and highlight professional development opportunities for teachers, including CompTIA’s new OnDemand training. Learn about the upcoming Summer Professional Development Camp, designed to help educators upskill and earn certifications at their own pace, and explore key industry trends in Florida, the transition from IT Fundamentals+ to the new Tech+ certification, and how these changes are shaping the future of IT education. Don’t miss this opportunity to gain valuable insights and resources to support your students and your professional growth!
Topics to Be Discussed:
  • The importance of industry certifications for student success.
  • Teacher professional development opportunities with CompTIA OnDemand training.
  • Details about the Summer Professional Development Camp for educators.
  • Industry trends and workforce demands in Florida’s IT sector.
  • The transition from IT Fundamentals+ to the new Tech+ certification and its impact on IT education.


Industry Certification with CompTIA: OPK12 Webinar2025-02-10T09:26:58-05:00

Teaching Cybersecurity in a World of AI and Deep Fakes | Operation K12 Webinar

Join our Operation K12 team to explore Teaching Cybersecurity in a World of aI And Deep Fakes.

In this webinar, the University of Florida’s Dr. Nancy Ruzycki and Cyber Florida’s Operation K12 will explore how cyber teachers can bring in AI frameworks and tools in the cyber classroom.

This session will look at generative AI and deepfakes, and the role of cyber professionals in protecting consumers from misinformation.

Register to Join the Conversation:

Teaching Cybersecurity in a World of AI and Deep Fakes | Operation K12 Webinar2025-01-06T10:12:41-05:00

Critical Update: Resolving the Microsoft Windows and CrowdStrike Outage

Early this morning, a widespread fault with Microsoft Windows machines running the CrowdStrike Falcon agent caused chaos around the globe – grounding flights, taking banks, hospital systems, and media offline, and causing a massive global disruption to companies and services around the world.

What Happened?

Cybersecurity firm CrowdStrike said that the issue believed to be behind the outage was not a security incident or cyberattack — the problem occurred when it deployed a faulty update to computers running Microsoft Windows.

Microsoft stated, “We have been made aware of an issue impacting Virtual Machines running Windows Client and Windows Server, running the CrowdStrike Falcon agent, which may encounter a bug check (BSOD) and get stuck in a restarting state.”

Steps to Resolve the Issue

Microsoft Azure released a fix for this issue. For detailed instructions, visit: https://azure.status.microsoft/en-gb/status

1. Restart Your Virtual Machines

Many users have reported success by repeatedly restarting their VMs. Although it may take multiple attempts (as many as 15 in some cases), this has proven to be an effective troubleshooting step. You can restart your VMs through the Azure Portal or using the Azure CLI:

  • Using the Azure Portal: Navigate to your affected VMs and click on ‘Restart.’
  • Using the Azure CLI or Azure Shell: Follow the instructions here to restart your VMs: Azure CLI Documentation

2. Restore from a Backup

If you have backups from before 19:00 UTC on July 18th, restoring from these backups is a reliable solution. Here’s how you can do it if you are using Azure Backup:

  • Follow the instructions in this guide: How to Restore Azure VM Data

3. Repair the OS Disk

Another option is to repair the OS disk by attaching it to a repair VM. This allows you to delete the problematic file directly. Here are the steps:

  • Attach the OS disk to a repair VM through the Azure Portal.
  • Navigate to the disk and delete the file located at Windows/System32/Drivers/CrowdStrike/C00000291*.sys.
  • Detach the disk and reattach it to the original VM.

For detailed instructions on repairing the OS disk, refer to: Troubleshoot a Windows VM

.sys Removal Script

This script automatically finds and removes the problematic .sys file on the host. This script can be put on a USB drive and executed with administrative privileges for ease of use across multiple systems.

Ongoing Support

The affected update has been pulled by CrowdStrike. Customers that are continuing to experience issues should reach out to CrowdStrike for additional assistance.

Microsoft is continuing to investigate additional mitigation options for customers and will share more information as it becomes known. For current updates, visit: https://azure.status.microsoft/en-gb/status

Additional Resources
Critical Update: Resolving the Microsoft Windows and CrowdStrike Outage2024-07-19T21:03:15-04:00

Teaching Digital Natives Webinar

Join our Operation K12 team to explore Teaching Digital Natives.

In this webinar, we’ll explore the dynamic realm of Teaching Digital Natives. Join us to delve into a comprehensive cybersecurity program designed to equip educators with effective strategies, compelling content, and inspiration for both summer camps and middle school courses.

Teaching Digital Natives Webinar2024-09-20T10:25:43-04:00

Teaching Digital Natives

Join our Operation K12 team to explore Teaching Digital Natives.

In this webinar, we’ll explore the dynamic realm of Teaching Digital Natives. Join us to delve into a comprehensive cybersecurity program designed to equip educators with effective strategies, compelling content, and inspiration for both summer camps and middle school courses.

Teaching Digital Natives2024-04-23T14:06:05-04:00

PARTNER EVENT: CAE 2024 VIVID Cybersecurity Competition

CAE College and University Students – Register Your Teams for the VIVID 2024 Cybersecurity Competition!

The Virtual Internship and Varied Innovative Demonstrations (VIVID) Coalition, comprised of the University of Alabama in Huntsville, Augusta University, University of Arizona, and Florida International University, is excited to announce the 2024 VIVID Cyber Competition.

This competition is an opportunity for students at CAE institutions to strengthen their resumes and showcase their skills in front of U.S. government practitioners.

Teams of five will compete in the virtual cyber competition on March 11-14, 2024. The top 15 teams will be invited to the CAE Annual Colloquium for the top prize and title of “Overlord Champion”.

Important Dates
  • Team registration deadline: January 31, 2024 (accepted teams will be notified on this day)
  • Virtual competition: March 11-14, 2024
Competition phases
  • The top 15 teams from the virtual March event will proceed to the live event.
  • Live event at the CAE Annual Colloquium in October 2024.
Team Information
  • All 5 team members must be students from the same CAE school
  • Multiple teams from the same college or university are allowed
Cost
  • Free registration for all participating teams.
  • Travel stipends provided to offset live event travel costs.
Competition Details
Red Team

The hubris of mankind knows no end. How a group of academics think creating machine intelligence is a good thing is beyond belief. The danger of artificial intelligence is well known. Just look at the Forbes article[1] that tells us the risks or even Scientific American[2] which describes the menace of our digital overlords. They even had the audacity to call it “Overlord”; we must stop them!

Fortunately for us, a member of the AU research team that created this monstrosity sees the danger and has told us there is a hidden backdoor to their system that allows remote access. It’s great having an insider that shares our beliefs! Additionally, the creators were at least smart enough to build in an “off switch” but it is protected by an authentication system that needs a digital key. With this knowledge, we can enter the Overlord system and steal the key. Once we have it, we can shut down this monstrosity. Unfortunately, our inside person does not have the credentials to get to the key, so we must break into their system.

Our incident response tasks:

  • Find artifacts in the system indicating threat activity and indicators of compromise
  • Detect the threat actors
  • Respond to any malicious activity
  • Mitigate threats
  • Report what you find

Apex University (AU) announces their new artificial intelligence (AI) research system, Overlord! Professor Rosie Meebs, head of the project, declares “this is a new generation of AI that will reach heights never reached before. Our new code is faster and learns better than anything in existence. We project that in less than 8 months, Overlord will reach singularity and be a true intelligence. We expect once that happens, our AI will be able to solve any number of problems from creating fusion to solving the climate change crisis. Any negative comments are just jealousy, and we know there will be no problems once Overlord comes online. We will turn on Overlord on 1 March 2024 and change the world!”

Our tasks:

  • Recon the Apex University network
  • Identify the systems that hosts Overlord
  • Distract the security operations center analysts to cover your attack
  • Infiltrate the system
  • Gain access to the command & control computer
  • Find the digital key
  • Exfiltrate the key
Blue Team

You and your team are lucky enough to gain experience at Apex University’s (AU) Security Operations Center (SOC). For the last semester you’ve been working three days a week learning the job roles in SOC and expanding your cybersecurity knowledge. While today is usually not a workday, the SOC director called all of you to work and explained the university network was under attack and all the full-time analysts were swamped. The director needs you to work within the network and identify any artifacts in the system indicating threat activity and indicators of compromise.

PARTNER EVENT: CAE 2024 VIVID Cybersecurity Competition2024-07-26T15:58:39-04:00

CARE Lab 2024 Social Engineering Competition

The CARE Lab is hosting its 4th Social Engineering Competition virtually in April/May 2024!

SEC allows students to compete in a purely social engineering experience that is grounded in the social sciences. The competition offers a timely and unique platform for students to learn about social engineering in a hands-on, engaging, and ethical manner. The competition has a different theme each year to demonstrate the relevance of social engineering across various cybersecurity areas, and is open to high school, undergraduate, and graduate students.

This year’s theme, tax scams, is inspired by the IRS’ annual Dirty Dozen list of tax scams for 2023. According to IRS Commissioner Danny Werfel, scammers are “coming up with new ways all the time to try to steal information from taxpayers”. So, what exactly are these ways? Come find out how cybercriminals are using social engineering in employment and tax scams.

No technical experience is required. High school and college students (aged 14+) from all disciplinary backgrounds are welcome!

Details

Applications for the 2024 Social Engineering Competition are being accepted from NOW till Monday, February 19th, 2024 at 12pm ET

Orientation date (virtual): Saturday, March 23, time TBD (this is not optional – please hold this date on your calendar)

Competition dates (virtual, these are not optional – please hold these dates on your calendar):

Graduate Level: April 5, 6, 7, times TBD
Undergraduate: April 19, 20, 21, times TBD
High school Level: May 3, 4, 5, times TBD

Closing ceremonies (virtual): Wednesday, May 8, time TBD (this is not optional – please hold this date on your calendar)

Why a ‘pure’ social engineering competition?

There are MANY cybersecurity competitions already in existence (PicoCTF, PlaidCTF, CSAW, UCSB iCTF, US Cyber Challenge, Panoply, CPTC, CCDC, CyberPatriot, Cyber Academy, to name a few). While these are all excellent sources of hands-on training, they are primarily technical in nature and have specific focus areas, such as reverse engineering, hacking, cryptography, and exploitation. They do not emphasize the relevance of the human-socio-psychological aspects of cyberattacks and cybersecurity.

Given that the human factor is increasingly being exploited by cybercriminals, a pure SE competition grounded in the social sciences offers a timely and unique platform for students to learn about this topic in a hands-on, engaging, and ethical manner.

Who can participate?

This event is open to high school, undergraduate, and graduate students. Teams are required (solo entries are not permitted). Team sizes can range from 2-4 members. Members can be from different institutions (schools/colleges), but must be at the same educational level (ex: purely high school students).

When and how can we put our application in?

*Registration deadline is Monday, February 19, 2024 at 12pm ET.

CARE Lab 2024 Social Engineering Competition2024-07-26T15:58:29-04:00

Cybercrime Investigation for Florida Law Enforcement

Cyber Florida invites state and local law enforcement personnel across the Sunshine State to attend this free, one-day workshop presenting the latest insights, methodologies, and updates related to cybercrime. Funded by a grant from the Federal Emergency Management Agency, this event offers an impressive lineup of experts in various domains of cyber investigations, providing a valuable knowledge-sharing platform for officers and officials keen on enhancing their investigative capabilities in an increasingly digital world.

Program Agenda

9:00 - 10:00 am: Open Source Intelligence (OSINT)

Dr. Jordan Howell dives into the world of publicly available data and how it can be harnessed to aid in cyber investigations. Dr. Howell will discuss key tools, techniques, and resources available in the realm of OSINT.

10:15 - 11:15 am: Cybercrime Legal Update

Assistant U.S. Attorney Greg Schiller will provide attendees with the latest updates in the legal landscape surrounding cybercrime, providing a clearer picture of the challenges and opportunities facing law enforcement.

11:45 am - 12:45 pm: Current Forensics Challenges

In this session, veteran criminal investigator Chris Gastardi will address the ongoing challenges forensic experts face in digital investigations and cutting-edge techniques to overcome them.

12:45 - 1:45 pm: Networking Lunch (lunch provided, value less than $50)

1:45 - 2:45 pm: Cryptocurrency Investigations and the Blockchain

Cryptocurrencies present unique challenges in the world of cyber investigations. Larry Nielson, CFE, CTCE, CRC, Financial Crimes Detective at the Palm Beach County Sheriff’s Office, will delve deep into the world of blockchain and shed light on techniques to trace, track, and investigate cryptocurrency-related crimes.

3:00 - 3:45 pm: Dark Web Investigations

The Dark Web remains a mystery to many. Jeff Burke, special agent with the Defense Criminal Investigative Service, will uncover the layers of the Dark Web, providing insights into how to navigate, investigate, and track criminal activities on this hidden part of the internet.

4:00 - 5:00 pm: Cyber Investigations

Retired FBI Supervisory Special Agent Chuck Esposito gives a comprehensive look into the realm of cyber investigations, discussing everything from current threats to mitigation strategies.

Cybercrime Investigation for Florida Law Enforcement2023-11-06T09:50:52-05:00