Detecting Data Breaches with Honeywords

Introduction Data breaches and security issues related to information leakage are a subject that has been making headlines in recent times. When a data breach happens, cybercriminals obtain... Go on to the site to read the full article ... Read More
Security+: Risk Management Processes and Concepts

Security+: Risk Management Processes and Concepts

Introduction The risk management process is a way of achieving a structured approach to the management of risk in IT corporations. Consistently implemented, it allows risks to be identified,... Go on to the site to read the full article ... Read More

Security+: Cloud and Virtualization Concepts

Introduction Cloud and virtualization represent crucial components of IT operations and are indispensable daily of an IT professional working in the cybersecurity landscape. The CompTIA Security +... Go on to the site to read the full article ... Read More

Mechanics Behind Ransomware-as-a-Service

Introduction Ransomware is an increasingly serious concern, and this problem is getting worse over time. Initially, this malware began to compromise fixed targets such as individuals, but now the... Go on to the site to read the full article ... Read More

BEC Attacks: How Attorney Impersonation Works

Cases of attorney impersonation are on the rise and often, they are accompanied by fraudulent requests for money or sensitive information. Techniques, such as spoofing of email addresses, whereby an... Go on to the site to read the full article ... Read More
BEC Attacks: How Email Account Compromise Works

BEC Attacks: How Email Account Compromise Works

Business email compromise (BEC) is a form of phishing attack in which a cyber attacker impersonates a high-level executive (often the CEO). From there, they then attempt to get to an unsuspecting... Go on to the site to read the full article ... Read More
The Art of Fileless Malware

The Art of Fileless Malware

| | Hacking
Introduction Malware has become a critical trend for companies around the world. We are looking at ransomware and other threats already lurking around the corner. It is right that the ability to... Go on to the site to read the full article ... Read More

How Business Email Compromise Attacks Work: A Detailed Case Study

| | Phishing
Business email compromise (BEC) attacks are widespread and growing in frequency. Due to their simplicity and effectiveness, BEC will continue to be one of the most popular attacks in 2018,... Go on to the site to read the full article ... Read More
Malicious Cryptominer in Wireless Networks

Malicious Cryptominer in Wireless Networks

Introduction The Cyber attacker is leveraging covert and malicious ways to produce digital money — often using Crypto miners. This clever technique is known specifically as “Crypto... Go on to the site to read the full article ... Read More
New Era of Crypto-jacking

New Era of Crypto-jacking

Introduction Recently, cryptocurrencies have been making the headlines, especially with the number of attacks that have been occurring. In technical terms, this is also known as... Go on to the site to read the full article ... Read More
Loading...