Password attacks involve exploiting a broken authorization vulnerability in the system combined with automatic password attack tools that speed up the guessing and cracking of passwords. The attacker uses various techniques to access and expose the credentials of a legitimate user, assuming their identity and privileges. The username-password combination is one of the oldest known account authentication techniques, so adversaries have had time to craft multiple methods of obtaining guessable passwords. Additionally, applications that use passwords as the sole authentication factor are vulnerable to password attacks since the vulnerabilities are well understood. read more
Industrial Cyber Security. Digital Marketing Techniques & Cybersecurity , YouTube tips and tricks
Thursday 7 July 2022
Wednesday 6 July 2022
SQL Injection
SQL injection is an attack in which malicious code is inserted into strings that are later passed to an instance of SQL Server for parsing and execution. Any procedure that constructs SQL statements should be reviewed for injection vulnerabilities because SQL Server will execute all syntactically valid queries that it receives. Even parameterized data can be manipulated by a skilled and determined attacker.read more
Tuesday 5 July 2022
Malware Detection
What is malware
Malware refers to malicious software perpetrators dispatch to infect individual computers or an entire organization’s network. It exploits target system vulnerabilities, such as a bug in legitimate software (e.g., a browser or web application plugin) that can be hijacked. A malware infiltration can be disastrous—consequences include data theft, extortion, or the crippling of network systems. read moreMonday 4 July 2022
Zero-day exploit Attack
Zero-day Attack?
Zero-day meaning and definition
"Zero-day" is a broad term that describes recently discovered security vulnerabilities that hackers can use to attack systems. The term "zero-day" refers to the fact that the vendor or developer has only just learned of the flaw – which means they have “zero days” to fix it. A zero-day attack takes place when hackers exploit the flaw before developers have a chance to address it.read more
Sunday 3 July 2022
SIEM Solutions
What is SIEM?
Security Information and Event Management is a set of integrated log management and monitoring tools that help organizations detect targeted attacks and data breaches. SIEM systems aggregate and analyze log event information from devices, infrastructure, systems, and applications to detect suspicious activity inside networks. When anomalous behavior is identified, an alert is generated for investigation.read more
Saturday 2 July 2022
Denial-of-Service (DoS) Attack
The attack meant to shut down a machine or network, making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic or sending it information that triggers a crash.
In both instances, the DoS attack deprives legitimate users (i.e. employees, members, or account holders) of the service or resource they expected read more
Friday 1 July 2022
Intrusion Detection and Prevention Systems
An Intrusion Detection and Prevention System (IDPs) monitors network traffic for indications of an attack, alerting administrators to possible attacks. IDPS solutions monitor traffic for patterns that match with known attacks. Traditionally, they used signature-based or statistical anomaly detection methods. Still, IDPS increasingly leverages machine learning technologies to process vast amounts of data and identify threats that signature and anomaly detection would miss.read more
Google Launches GUAC Open Source Project to Secure Software Supply Chain
Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...
-
What is a Script Kiddie? A script kiddie, or skid, is a term that describes a young hacker who has much to learn yet acts as if he or she ...
-
Cryptolocker Virus Definition Cryptolocker is a malware threat that gained notoriety over the last few years. It is a Trojan horse that infe...
-
What is hacktivism? Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individ...