web shell attack

2 years ago
Petroslav Pavlovič

Between August 2020 and January 2021, there were 140,000 web shell attacks. (Microsoft) How hackers can performing web shell A…

How to avoid an attacker will spoof your email?

2 years ago

Over 3 billion domain spoofing emails delivered per day. Yahoo was the most impersonated brand for phishing attacks during Q4…

NetBIOS enumeration

3 years ago

What is NetBIOS (Network Basic Input/Output System)? Programs running on Microsoft Windows-based systems communicate with one another across a local…

Cyber Kill Chain – Part 1 – Reconnaissance

3 years ago

A security tactic called the Cyber Kill Chain outlines the steps a cyber attacker must take in order to successfully…

How to start with Nmap, alias first 10 commands

3 years ago

A well-known open-source security program called Nmap (Network Mapper) is used to find hosts and services on a computer network…

How to help secure your organization by using Google Dorks

3 years ago

What are Google dorks? Google dorks are search queries that employ sophisticated search operators to locate particular online data that…

Quick overview of how to Trust Nobody!

3 years ago

68% of cybersecurity leaders say secure cloud transformation is impossible with legacy network security infrastructure such as firewalls and VPNs.…

Artificial Intelligence, Security assistant, or Threat?

3 years ago

A July 2022 report by Acumen Research and Consulting says the global market was $14.9 billion in 2021 and is…

Have you troubled to remember all your passwords?

3 years ago

Password Manager Benefits And Choices. Web users without password managers are three times more likely to experience identity theft than…

Blockchain storage

3 years ago

For keeping data backup copies, decentralized, distributed storage systems can be madeusing blockchain technology. These systems don't use a centralized…