OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack... BLOG Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
OilRig APT’s Innovative Backdoor Creates a Pipeline for Data Exfiltration A recent slew of cyberattacks has targeted a telecom company in the Middle East. The malicious group behind the attack...
BLOG Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team... How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by... The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known... Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered... What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features... Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing... Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,... Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as... The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...
Analysis of TrickBot Malware – the most prolific COVID-19 themed malware July 23, 2020 In this article you will learn about: Distribution techniques of TrickBot malware Different modules and tasks of the TrickBot payload ...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
What is US-Cert and How to benefit from it? July 9, 2020 “Cyber security is a shared responsibility. Working together, we can secure America’s cyberspace.” The United States Computer Emergency Readiness Team...
How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Red Teaming Vs. Blue Teaming June 24, 2020 What is a Red Team? The penetration testing of different systems and their level of security programs are focused by...
The Basics of Network Forensics June 23, 2020 The process of capture, recording, and analysis of network packets to determine the source of network security attacks is known...
Digital Signatures – What Are They and How Do They Work? June 22, 2020 A Digital Signature is a type of signature that guarantees that the contents of a message have not been altered...
What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
A Look Into Application Security June 18, 2020 What is Application Security? According to vmware website, application security is the process of developing, adding, and testing security features...
Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
A Flaw in VMware Cloud June 17, 2020 Penetration testers at Citadel discovered a new vulnerability in VMware’s Cloud Directory platform on April 9. They discovered during auditing...
Cybersecurity and The Health Care Industry June 16, 2020 Cybersecurity has become a crucial issue for many organizations but also for private individuals. As well as for regular crime,...
Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as...
The Importance of Threat Intelligence June 12, 2020 Threat Intelligence is data collected and analyzed by an organization in order to understand a threat actor’s motives, targets, and attack...