Malware spotlight: Hybrid malware

| | Malware Analysis
Introduction Hybrid malware, also known as combo malware, is a combination of two or more different types of attacks — usually a Trojan horse or worm with adware or malware attached. Hybrid malware... Go on to the site to read the full article ... Read More

Malware spotlight: Fileless malware

| | Malware Analysis
Introduction Fileless malware is a malicious technique that uses existing software, legitimate applications, operating system files and the authorized protocols of the victim’s machine to achieve... Go on to the site to read the full article ... Read More

NIST CSF: NIST CSF core functions

| | NIST CSF Core Functions
Introduction The National Institute of Standards and Technology (NIST)’s Cybersecurity Security Framework (CSF) Core consists of five functions. They include: Identify Protect Detect Respond Recover... Go on to the site to read the full article ... Read More

NIST CSF: The NIST CSF components

| | NIST CSF Components
Introduction The National Institute of Standards and Technology (NIST)’s Cybersecurity Security Framework (CSF) consists of three main components. They are: Implementation tiers Framework core... Go on to the site to read the full article ... Read More

Cybersecurity architect salary

Introduction The role of cybersecurity architect has become vital in the IT department of any organization in the 21st century. IT threats and attacks happen every day, and they are increasing in... Go on to the site to read the full article ... Read More

Malware spotlight: What is a Remote Access Trojan (RAT)?

| | Malware Analysis
Introduction A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s... Go on to the site to read the full article ... Read More

Penetration testing certifications

Introduction In our digital world, cybersecurity is of the utmost importance. Most businesses are connected through fragile networks. Compromising them via cyberattacks may jeopardize internet... Go on to the site to read the full article ... Read More

Cybersecurity architect certifications

Introduction If you are planning to become a cybersecurity architect, certifications are a good way to validate your skills in designing, building, implementing and overseeing cybersecurity... Go on to the site to read the full article ... Read More

Malware spotlight: Crypto-jacking

| | Malware Analysis
Introduction In this article, we will explore crypto-jacking, a growing malware-based epidemic in the cryptocurrency realm. Before understanding this threat, though, it is necessary to understand... Go on to the site to read the full article ... Read More

Malware spotlight: what is ransomware?

| | General Security
Introduction Ransomware is a type of malware that is used to digitally extort victims. It does this by preventing them from accessing their systems or files unless they pay a ransom to the... Go on to the site to read the full article ... Read More