Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup …
What is the COBIT and why you need to know about it
Business processes today are largely dictated by the technology around them. Cloud computing, big data, and social media are just …
Defining and Understanding User and Entity Behavior Analytics (UEBA)
User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while helping …
U.S Files Lawsuit Against Edward Snowden for Publishing his Book
The united states department of justice filed a LawSuit against Edward Snowden for publishing a book violating the non-disclosure agreements …
CWE Top 25 (2019) – List of Top 25 Most Dangerous Software Weakness that Developers Need to Focus
MITRE has released a list of Top 25 Most Dangerous Software Errors (CWE Top 25) that are widely spread and …
Simjacker Vulnerability – Attackers take Control Over Mobile Phones via an SMS Message
Security researchers disclosed a new attack dubbed Simjacker, that can be exploited by sending an SMS containing a specific type …
Importance of Security Analytics
Security analytics is a process of collecting data, aggregating, and using tools to analyze the data in order to monitor …
GodOfWar – Malicious Java WAR builder with built-in payloads
A command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby. Features Preexisting payloads. …
The Five Incident Response Steps
It is important to remember that implementing incident response steps is a process and not an isolated event. For a …
What Is Advanced Threat Protection?
Advanced Threat Protection, or ATP, is a type of security solution specifically designed to defend a network or system from …