Incident Management

What is Incident Management? Security incident management is the process of identifying, managing, recording and analyzing security threats or incidents in real-time. It seeks to give a robust and comprehensive view of any security issues within an IT infrastructure. A security incident can be anything from an active threat to an attempted intrusion to a […]

Artificial Intelligence in Cybersecurity

INTRODUCTION AI is ideally suited to solve some of our most difficult problems, and cybersecurity certainly falls into that category. With today’s ever evolving cyber-attacks and proliferation of devices, machine learning and AI can be used to “keep up with the bad guys,” automating threat detection and respond more efficiently than traditional software-driven approaches. At […]

Juice Jacking – A Concise Overview

  What is Juice Jacking? Juice jacking is a type of cyber attack where you unknowingly plug in your mobile or electronic device into a USB port that is infected with malware which then gets loaded on the phone once a connection is made. This malware can violate your privacy by gaining direct access to […]

Cyber Weekly 42-2022

This week’s latest Cybersecurity updates Bolster Raises $15 Million to Tackle Fakes and Frauds. Keystone Health Data Breach Impacts 235,000 Patients. WordPress Security Update 6.0.3 Patches 16 Vulnerabilities. Google’s GUAC Open-Source Tool Centralizes Software Security Metadata. FBI Warns of Iranian Cyber Firm’s Hack-and-Leak Operations. Critical Flaw Reported in Move Virtual Machine Powering the Aptos Blockchain […]

What is Kerberosting

What is Kerberoasting ? The general concept of Kerberoasting is requesting service tickets (TGS) from the KDC (Kerberos Domain Controller) that are associated with service accounts to retrieve their hashes. Then, attempt to crack them offline with tools like Hashcat or John to recover the cleartext passwords to either escalate privileges vertically to become a local administrator or horizontally to access a set of different resources that can […]

How to find hidden directories in a website

The reconnaissance and scanning phases of a penetration test are arguably the most important of the entire process. Without a clear understanding of the bigger picture and the avenues potentially available to you, you won’t be going very far at all. As part of this process, it’s very likely that you regularly come up against […]

How to use Proxychains

Proxy Chains

Using a Linux-based operating system to hide your identity on the internet is quite simple, and you can do it all without paying for a VPN service like those available today. Kali Linux distributions are used to test the security of WiFi networks, websites, and servers, among other things. Operating systems like Debian and Ubuntu are also […]

Data privacy vs Data security

data-privacy-vs-data-security-

When it comes to data security and data privacy, these terms are often exchanged. Whether these are synonyms , closely connected with each other or do have some difference? Let’s clear this through this post.  Firms who manage and collect their data needs  protection  and security in a well manner. So what is privacy and […]

cyber security and cloud security

Cloud security vs cyber

Introduction- In the age of digital world , data from almost every company is available in digital format. But as technology advances, cybercrime grows rapidly , making devices and data more exposed. As a result, it is important that businesses take steps to protect their data and sensitive information. The first thing that comes to mind when […]

Cybersecurity Interview Questions Part-4

In continuation of our interview series, here we are presenting the 4th part in our interview series. Let’s begin: Q1. How firewall can aid in malware mitigation? An enterprise firewall between your internal network and the Internet provides one layer of protection for the internal computers. However, not all threats come through the “front door” […]