Pyramid of pain in Threat Hunting
Pyramid of pain is an interesting and important topic of Cyber threat Intelligence and Threat Hunting. It was first introduced in 2013 by Security professional David J Bianco Its main…
Hunt the Haunt
Pyramid of pain is an interesting and important topic of Cyber threat Intelligence and Threat Hunting. It was first introduced in 2013 by Security professional David J Bianco Its main…
Cybersecurity Incident Response is a process of the Organization to detect, prevent and eradicate malicious incidents, threats, attacks that breach the company networks. . This is important for a security…
Most of them think that firewall and Antivirus are the same from the process and their functions. But it’s not the same both Antivirus and firewall are part of cybersecurity…
What is TCP? Transmission Control Protocol (TCP) is mostly used for internet Protocols once the connection is established. TCP/IP is used to send and receive data transmitted from the network…
Ransomware is one of the dangerous threats in the digital security world in recent times. It is the most dangerous threat which is capable of encrypting the data and asking…
OSI Layers – Open System Interconnection Model is a framework that describes the characteristics and communications functions of telecommunication or computing systems. OSI model became popular around the 1980s and was adopted…