Thursday 7 July 2022

Password Attacks

Password attacks involve exploiting a broken authorization vulnerability in the system combined with automatic password attack tools that speed up the guessing and cracking of passwords. The attacker uses various techniques to access and expose the credentials of a legitimate user, assuming their identity and privileges. The username-password combination is one of the oldest known account authentication techniques, so adversaries have had time to craft multiple methods of obtaining guessable passwords. Additionally, applications that use passwords as the sole authentication factor are vulnerable to password attacks since the vulnerabilities are well understood. read more




Wednesday 6 July 2022

SQL Injection

SQL Injectin

SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.read more


Tuesday 5 July 2022

Malware Detection

 


What is malware

Malware refers to malicious software perpetrators dispatch to infect individual computers or an entire organization’s network. It exploits target system vulnerabilities, such as a bug in legitimate software (e.g., a browser or web application plugin) that can be hijacked. A malware infiltration can be disastrous—consequences include data theft, extortion, or the crippling of network systems. read more

Monday 4 July 2022

Zero-day exploit Attack

 



Zero-day Attack?

Zero-day meaning and definition

"Zero-day" is a broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems. The term "zero-day" refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it.read more

Sunday 3 July 2022

SIEM Solutions

 


What is SIEM?

Security Information and Event Management is a set of integrated log management and monitoring tools that help organizations detect targeted attacks and data breaches. SIEM systems aggregate and analyze log event information from devices, infrastructure, systems, and applications to detect suspicious activity inside networks. When anomalous behavior is identified, an alert is generated for investigation.read more

Saturday 2 July 2022

Denial-of-Service (DoS) Attack




The attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.

In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected read more

Friday 1 July 2022

Intrusion Detection and Prevention Systems

 


An Intrusion Detection and Prevention System (IDPs) monitors network traffic for indications of an attack, alerting administrators to possible attacks. IDPS solutions monitor traffic for patterns that match with known attacks. Traditionally, they used signature-based or statistical anomaly detection methods. Still, IDPS increasingly leverages machine learning technologies to process vast amounts of data and identify threats that signature and anomaly detection would miss.read more

Google Launches GUAC Open Source Project to Secure Software Supply Chain

Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...