The KC7 Blog
Learn more about KC7 product updates and events.

The Valdoria Times Post-Incident Report
On January 22, 2024, The Valdorian Times published an unapproved article that made defamatory statements about a candidate in the Valdoria mayoral...
greg-kc7

simandsec
In June 2024, KC7 s second cybersecurity summer camp welcomed nearly 50 young participants in Central Kentucky, continuing our mission to cultivate...

simandsec
Welcome back to cybersecurity camp! This year, we are excited to welcome back almost 50 campers! As with last year, our focus is on helping students...

simandsec
In June 2023, the KC7 Foundation piloted a curriculum that brought real-world cybersecurity analysis to a group of 4th through 7th graders from...

waymonho
- What a file hash is and why it s important in threat intelligence and digital forensic investigations - 3 Commonly used Cryptographic Hashing...

emily
Imagine you want to get your driver s license, but you don t own a car. You ve never even seen a car. So you read all about combustion engines and...

cearrbhallj
Working as a threat intelligence analyst is a dream come true for me. I love my job and enjoy getting to investigate new attacks every day. But the...

waymonho
- What JARM Fingerprinting is and how it can be used to track malware infrastructure - Use JARM to identify a fingerprint and search across Censys.io...

waymonho
Difficulty Level Beginner What you will learn - What an IP address is - Differences between Public Private IP addresses - WhoIS information for IP...

waymonho
We re thrilled to announce the latest addition to our KC7 trainings Learning Modules! Learning Modules are an expansion of KC7 s offerings, providing...