Business processes today are largely dictated by the technology around them. Cloud computing, big data, and social media are just …
Defining and Understanding User and Entity Behavior Analytics (UEBA)
User and Entity Behavior Analytics, or UEBA for short, provides you with a comprehensive solution for IT security while helping …
U.S Files Lawsuit Against Edward Snowden for Publishing his Book
The united states department of justice filed a LawSuit against Edward Snowden for publishing a book violating the non-disclosure agreements …
CWE Top 25 (2019) – List of Top 25 Most Dangerous Software Weakness that Developers Need to Focus
MITRE has released a list of Top 25 Most Dangerous Software Errors (CWE Top 25) that are widely spread and …
Simjacker Vulnerability – Attackers take Control Over Mobile Phones via an SMS Message
Security researchers disclosed a new attack dubbed Simjacker, that can be exploited by sending an SMS containing a specific type …
Importance of Security Analytics
Security analytics is a process of collecting data, aggregating, and using tools to analyze the data in order to monitor …
GodOfWar – Malicious Java WAR builder with built-in payloads
A command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby. Features Preexisting payloads. …
The Five Incident Response Steps
It is important to remember that implementing incident response steps is a process and not an isolated event. For a …
What Is Advanced Threat Protection?
Advanced Threat Protection, or ATP, is a type of security solution specifically designed to defend a network or system from …
What Does GDPR Mean for Your Organization?
GDPR ,or the General Data Prevention Regulation, is a new law that has been enforced by the European Union since …