Search Results for: company network Page Insurance Panels September 9, 2021 At LIFARS, we believe that success is achieved by building relationships with clients and also with our alliances, based on... Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they... Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either... Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during... Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux... Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated... Page LIFARS September 23, 2020 Blog Post The Ryuk Ransomware June 19, 2019 Ryuk ransomware is a malicious malware that specifically targets enterprise environments for a large bitcoin payment. GRIM SPIDER was the group... Blog Post Understanding Firewalls For Home and Small Office Use February 28, 2020 Attacks are susceptible to happen when your computer is accessible through an internet connection or Wi-Fi network. Nevertheless, by using... Blog Post Securing Enterprise Wireless Networks May 8, 2020 With the development of enterprise digital transformation and the increasing demand for BYOD, more and more companies establish wireless networks... Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent... Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and... Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...
Page Insurance Panels September 9, 2021 At LIFARS, we believe that success is achieved by building relationships with clients and also with our alliances, based on...
Blog Post Has Your Home Network Been Compromised!? September 29, 2020 Have you ever wondered if you would notice that your home network was compromised? Attackers can be stealthy, and they...
Blog Post What is black box Pentesting? October 28, 2020 Organizations implement a broad range of security measures to maintain a sound security posture. These security measures can be either...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Blog Post What Is Cyber Kill Chain Process? October 23, 2020 Cyber Kill Chain is a concept branded by Lockheed Martin, that describes how the attacker proceeds with his steps during...
Blog Post OffSec Releases Win-KeX 2.0 with Exciting New Features October 7, 2020 Win-KeX is a Kali Desktop Experience for Windows Subsystem for Linux (WSL 2). It allows users to run Kali Linux...
Blog Post Cybersecurity Threats to Critical Infrastructure September 13, 2021 In the world of cybersecurity, critical infrastructure is becoming targeted at an alarming rate. As cyber criminals become more sophisticated...
Blog Post The Ryuk Ransomware June 19, 2019 Ryuk ransomware is a malicious malware that specifically targets enterprise environments for a large bitcoin payment. GRIM SPIDER was the group...
Blog Post Understanding Firewalls For Home and Small Office Use February 28, 2020 Attacks are susceptible to happen when your computer is accessible through an internet connection or Wi-Fi network. Nevertheless, by using...
Blog Post Securing Enterprise Wireless Networks May 8, 2020 With the development of enterprise digital transformation and the increasing demand for BYOD, more and more companies establish wireless networks...
Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent...
Blog Post E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
Blog Post Network Intrusion – Detection and Prevention May 13, 2020 Network intrusion refers to any unauthorized activity on a digital network. Network intrusions often involve stealing valuable network resources and...
Blog Post Missing SPARTA in latest Kali Linux 2020.1? Try LEGION! April 28, 2020 Popular open-source tool Sparta is no longer available in Kali Linux because of unsupported Python version. Tools depending on Python...