Most Recent

IDS vs IPS : Key Differences , Rule Structure , Pros and Cons

In 2021, the people accessing the network are in billion. Customers, vendors, and even remote users will be accessing our network. The lonely hacker...

Detecting and Preventing a Silver Ticket Attack

Silver Ticket is similar to Golden Ticket, wherein the golden ticket attack, attackers have full control to Domain itself. But Silver Ticket provides access...

Lateral Movement Detection with Windows Event Logs

Lateral movement refers to the behaviors of cyber attackers after gaining initial access to the assets and moves around the compromised network for sensitive...

How Attackers are Using LNK Files to Spread Malware

Malware is the buzzword that we could hear every other day through some of the other means. There is a drastic increase in the...

Directory Listing Vulnerability – Detection & Prevention

Directory is a familiar word we use or we know which will contain some files in it. Files are kept held together in a...

Newsletter

Sign up for Daily Updates

Most Popular