Thursday 30 June 2022

Cross-site Scripting (XSS) Attack

Cross-site Scripting (XSS)

Cross-site Scripting (XSS) is a client-side code injection attack. The attacker aims to execute malicious scripts in the web browser of the victim by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code. The web page or web application becomes a vehicle to deliver the malicious script to the user’s browser. Vulnerable vehicles that are commonly used for Cross-site Scripting attacks are forums, message boards, and web pages that allow comments.read more

Wednesday 29 June 2022

Managed Security Services

Definition Of Managed Security Services

Third-party providers offer managed security services for the oversight and administration of a company’s security processes. Managed security service providers (MSSPs) conduct services either in-house or remotely, typically via the cloud. MSSPs offer a wide range of security services, from setting up infrastructure to security management or incident response. Some managed security service providers specialize in certain areas while others offer full outsourcing of an enterprise’s information security program read complete blog


Tuesday 28 June 2022

Phishing

Phishing occurs when hackers pose as a trusted figure who uses carefully crafted emails to trick you into visiting a malicious website, downloading a corrupt file, or handing over your password before using that information to gain access to a business network or your personal information. One of the most common ways phishing occurs is by using the art of storytelling to entice users to interact with a link or attachment  read more

Monday 27 June 2022

Security Operations Center (SOC)


 

A security operations center (SOC) is a command center facility for a team of information technology IT professionals with expertise in information security (infosec) who monitors, analyzes, and protects an organization from cyber attacks read more

Sunday 26 June 2022

Security GPA Assessments

 



A gap analysis is a study to determine the difference between the current state of information security and its ideal or optimum state of security. Gap analysis is a vital part of business continuity planning and is also a form of risk assessment.read more

Saturday 25 June 2022

Network Firewalls

 



Unified Security Policy:

Firewalls can enforce security policies but only for the traffic that passes through them. With FWaaS, it is much easier for an organization to send all of its traffic through one of its firewalls, enabling the enforcement of consistent and unified security policies across its entire network.read more

Friday 24 June 2022

Email Spam Filters


 

What is a spam filter?

Spam filters are designed to identify incoming dangerous emails from attackers or marketers. Attackers often use emails that claim to offer a beneficial service or protect you from imminent danger, but they are really just clickbait, designed to get you to click on a link that downloads malicious software onto your computer or sends you to a dangerous site.read more

Google Launches GUAC Open Source Project to Secure Software Supply Chain

Google on Thursday announced that it's seeking contributors to a new open-source initiative called Graph for Understanding Artifact Comp...