APT Security: What Are Advanced Persistent Threats?
In November 2014, Sony Pictures publicly disclosed that their systems had been breached, and that large amounts of internal corporate data—including executive emails, the personal information of past and present employees, and previously unreleased movies—were made available for illegal download.
What is a Security Operations Center (SOC)?
Organizations have found different ways to effectively protect their infrastructure against cyber attacks. Some standard cybersecurity practices involve firewalls, antimalware software and endpoint security tools, but many of these commonly used techniques are simply not enough to make you invulnerable. Not in the current threat landscape, anyway.
What is an Attack Vector?
Hacked systems and data breach incidents are among the worst problems many companies face every day. Even the most brilliant of IT companies will suffer cyberattacks sooner or later.
Builders vs Breakers: Bridging the gap Between Software Development and InfoSec with Tanya Janca
Application security testing and assessment commonly occurs toward the end of the standard software development life cycle (SDLC). During this time, code reviews and penetration tests are done to ensure no security flaws or bugs are found in the application before it moves on to production. As much...
OWASP Amass: A Solid Information Gathering Tool
Throughout history, human beings have crafted tools as a way to improve people’s lives. From stone hammers to metal knives, through advancements from rudimentary medical instruments to breakthroughs made with industrial steam machinery.
Finding Coronavirus Malicious Domain Names
The coronavirus outbreak (COVID-19) is arguably one of the most widely publicized events of the century. Information surrounding this pandemic has been incredibly spare, provoking a true “infodemic” through the spread of unhelpful related content like jokes, doubtful home prevention treatments and viral fake videos, along with useful and accurate information as well.
Top 5 Nmap Online Alternatives
While working with a terminal on Unix or Linux can feel like the better part of driving a manual car, with the vehicle’s full power in your hands and the sense you get of old-fashioned control, some people prefer the automatic variety. These people want an easier experience, with something that simply “works” while doing much of the work for you.
Top 5 Password Managers to Keep Your Accounts Safe
Most of us have a number of online accounts, and often fall into a rut of reusing the same password for some, if not all, of them. Convenience aside, having a strong password provides critical protection from cyber attacks—as one of the most common ways hackers break into systems is by merely guessing at passwords.
Whois History: How to Check the Domain Owner History
Last week, we published an interesting topic about newly registered domain names, and how monitoring these could help the infosec industry investigate malicious incidents such as malware, viruses and phishing campaigns.
From heroes to deviants: Discussing the cultures of hacking with Gabriella Biella Coleman
When talking about hacker cultures, the media often blurs the lines between the act of hacking and criminality, inadventaly propping up stereotypes that plague the figure of the hacker. In reality, hackers feed into a socially and politically significant subculture with unique social and behaviora...