- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Many organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but they remain unsure of how to start threat-hunting or how far along they are in developing their own hunt capabilities. So, the question is --How can you quantify where your organization stands on the road to effective hunting?
Here, we will discuss a general model that can map threat-hunting maturity across any organization.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The basis for this attack often targets applications like Web Servers (i.e., Windows IIS, Apache, etc…); however, application layer attacks have been evolving to application platforms like WordPress, Joomla, Drupal, Magento, and others.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
White Box Penetration Testing:
White box penetration testing involves sharing full network and system information with the tester, including network maps and credentials. This helps to save time and reduce the overall cost of an engagement.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Here IP stands for 'Internet Protocol and 'Sec' for secure. The Internet Protocol is the main routing protocol used on the Internet and it designates where data will go using IP addresses. IPSec is secure because it adds encryption and authentication to this process.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This post is intended to brief you with top known vulnerabilities that exists in systems, particularly in Web Applications.
OWASP or Open Web Application Security Project is a worldwide not-for-profit charitable organization which is focused on improving the security of software. It regularly publishes top security holes across applications and suggestions on fixing the same.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Virtualized security, or security virtualization, refers to security solutions that are software-based and designed to work within a virtualized IT environment. They are different from traditional, hardware-based network security, which is static and runs on devices such as traditional firewalls, routers, and switches.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The CIA Triad of confidentiality, integrity and availability is considered the core underpinning of information security. Every security control and every security vulnerability can be viewed in light of one or more of these key concepts. For a security program to be considered comprehensive and complete, it must adequately address the entire CIA Triad.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Brute force attacks occur when a bad actor attempts a large amount of 'user name and password' combinations on a target. These attacks frequently involve multiple attempts on account passwords with the hopes that one of them will be valid. It’s a bit like trying all of the possible combinations on a padlock, but on a much larger scale.
Passwords are not the only resource that can be brute forced: Links and directories, usernames, and emails are other common targets.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Packet Capture or PCAP (also known as libpcap) is an application programming interface (API) that captures live network packet data from OSI model Layers 2-7.
Unix-like systems implement pcap in the libpcap library; for Windows, there is a port of libpcap named WinPcap that is no longer supported or developed, and a port named Npcap for Windows 7 and later that is still supported.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Both SSL (Secure Socket Layer) and TLS (Transport Layer Security) are the foundations of a secure connection for communication across an unsecured network. At present, over 90% of internet traffic across Google is being encrypted, according to the Google Transparency Report.
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Security Onion is a free and open source alternative to expensive enterprise security solutions!
Security Onion can be described as a Network Security Monitoring (NSM) platform that “provides context, intelligence and situational awareness of your network.”
- What is Volume-based DDoS Attack? Know about Top-3 Largest Known DDoS Attacks
- What is VPN ? How Can You Choose a Good VPN ?
- What Is Input Validation? What are Strategies to Handle Input Validation?
- Who is a Vulnerability Assessment Analyst? What are his Typical Work Duties?
- Mapping the OWASP Top 10 to Blockchain
- What is Principle of Least Privilege? Why is this Principle So Important?
- What is UEFI Secure Boot? Beware of TRICKBOOT
- An Integrated Strategy to Protect and Defend Your Enterprise
- What is Red Teaming?
- What are Digital Certificates? How does the Creation of a Digital Certificate Happen?