Indicators of Compromise (IoCs)
An Indicator of Compromise is like a clue, I see a magnifying glass here. An artifact, a little piece of forensic data that’s…
An Indicator of Compromise is like a clue, I see a magnifying glass here. An artifact, a little piece of forensic data that’s…
So, you know, everyone has their own style, right? The way they dress the way they walk what they do. And if…
The figure shows the cyber kill chain. It sounds mysterious but actually it’s not that mysterious. We have reconnaissance, weaponization, delivery, exploitation, installation, command, and…
What is information security? While we have information, information is actually different than data. Information has meaning, and as such…
One of the biggest threats to watch out for on social media is fraud perpetrated by people who aren’t who…
Network Mapper, otherwise known as “Nmap,” is a powerful open-source program, perfect for conducting reconnaissance and enumeration. Yes, Nmap is…
Which Ports Are Usually Open By Default? There are a LOT of ports. A port number can be anything from…
Even with the virtual assistant turned off, most of us have suspected our mobile phone is listening to our private conversations. While…
Digital forensics is a process often used in criminal investigations. It involves collecting digital evidence from various devices, tools, or…
Any malicious software intended to harm or exploit any programmable device, service, or network is referred to as malware. Cybercriminals…