Malware spotlight: Hybrid malware
Introduction Hybrid malware, also known as combo malware, is a combination of two or more different types of attacks — usually a Trojan horse or worm with adware or malware attached. Hybrid malware... Go on to the site to read the full article ... Read More
Malware spotlight: Fileless malware
Introduction Fileless malware is a malicious technique that uses existing software, legitimate applications, operating system files and the authorized protocols of the victim’s machine to achieve... Go on to the site to read the full article ... Read More
NIST CSF: NIST CSF core functions
Introduction The National Institute of Standards and Technology (NIST)’s Cybersecurity Security Framework (CSF) Core consists of five functions. They include: Identify Protect Detect Respond Recover... Go on to the site to read the full article ... Read More
NIST CSF: The NIST CSF components
Introduction The National Institute of Standards and Technology (NIST)’s Cybersecurity Security Framework (CSF) consists of three main components. They are: Implementation tiers Framework core... Go on to the site to read the full article ... Read More
Cybersecurity architect salary
Introduction The role of cybersecurity architect has become vital in the IT department of any organization in the 21st century. IT threats and attacks happen every day, and they are increasing in... Go on to the site to read the full article ... Read More
Malware spotlight: What is a Remote Access Trojan (RAT)?
Introduction A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s... Go on to the site to read the full article ... Read More
Penetration testing certifications
Introduction In our digital world, cybersecurity is of the utmost importance. Most businesses are connected through fragile networks. Compromising them via cyberattacks may jeopardize internet... Go on to the site to read the full article ... Read More
Cybersecurity architect certifications
Introduction If you are planning to become a cybersecurity architect, certifications are a good way to validate your skills in designing, building, implementing and overseeing cybersecurity... Go on to the site to read the full article ... Read More
Malware spotlight: Crypto-jacking
Introduction In this article, we will explore crypto-jacking, a growing malware-based epidemic in the cryptocurrency realm. Before understanding this threat, though, it is necessary to understand... Go on to the site to read the full article ... Read More
Malware spotlight: what is ransomware?
Introduction Ransomware is a type of malware that is used to digitally extort victims. It does this by preventing them from accessing their systems or files unless they pay a ransom to the... Go on to the site to read the full article ... Read More