Ethical hacking Latest Posts

Indicators of Compromise (IoCs)

An Indicator of Compromise is like a clue, I see a magnifying glass here. An artifact, a little piece of forensic data that’s…

Ethical hacking Latest Posts

Tactics, Techniques, and Procedures (TTPs)

So, you know, everyone has their own style, right? The way they dress the way they walk what they do. And if…

Editors Choice Ethical hacking

Cyber Kill Chain Methodology

The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…

Ethical hacking Latest Posts Network Security

UNDERSTANDING NEED FOR SECURITY

What is information security? While we have information, information is actually different than data. Information has meaning, and as such…

Latest Posts

Fake friends and followers on social media – and how to spot them

One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who…

Ethical hacking Latest Posts

PenTest Edition: Go from Beginner to Advanced with nmap

Network Mapper, otherwise known as “Nmap,” is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, Nmap is…

Ethical hacking Latest Posts Network Security

How to Find Open/Blocked TCP/UDP ports?

Which Ports Are Usually Open By Default? There are a LOT of ports. A port number can be anything from…

Editors Choice Latest Posts

How to tell if your smartphone is spying on you

Even with the virtual assistant turned off, most of us have suspected our mobile phone is listening to our private conversations. While…

Digital Forensics Editors Choice

Cases Solved Through Digital Forensics

Digital forensics is a process often used in criminal investigations. It involves collecting digital evidence from various devices, tools, or…

Latest Posts Vulnerability

Malware and its types

Any malicious software intended to harm or exploit any programmable device, service, or network is referred to as malware. Cybercriminals…