Open-source intelligence techniques and visualization
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
Hunt the Haunt
As Incident Response defenders, we will always be interested to know that how the attackers gain as much information about the target without ever touching the Organization and infrastructure or…
What is Threat Hunting? Threat Hunting is a proactive approach to find the patterns of the existing malware in our network. As it’s a focused way to find the security…
Definition of Artificial Intelligence (AI): Artificial Intelligence (AI) is a branch of computer science concerned with creating systems and algorithms that enable machines to perform tasks that would typically require…
5G (fifth-generation) technology promises to bring about significant improvements in speed, latency, and connectivity for IoT (Internet of Things) devices and other connected systems. However, 5G also presents new cybersecurity…
Multi-factor authentication (MFA) is a security process that requires users to provide two or more forms of identification before gaining access to a service or system. The idea behind MFA…
Cybercrime refers to criminal activities that are committed using the internet or other forms of digital communication. This includes a wide range of illegal activities such as hacking, identity theft,…
False negative and True negative In the context of security, a false negative and a true negative refer to the results of a security system’s detection capabilities. A false negative,…
As per the Palo Alto cyber security analyst, a recent adware campaign has been found targeting google search engine requests through malicious browser extensions. Palo’s threat intelligence claims that attackers…
5Cs of Cyber Security Physical and logical Cyber security is the topmost priority for most enterprises today. The risk management plan for Cyber security is as essential as having a…
The Cyber kill chain is the term which was initially started from the military, the military term as kill chain. Here cyber kill chain model has different stages of an…