© 2023 Hashnode
#cybersec
Welcome back. let's seize the moment! Let's look at firewalls. What are firewalls? A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based …
Networking what is computer networking? Computer networking is the practice of linking computer devices together to facilitate communication and the sharing of resources. This can be done through wir…
STRIDE and PASTA are like two superhuman frameworks that assist with protecting your digital world from bad guys. They cooperate to distinguish and order expected threats and ensure that you are gener…
The Culprit … Human error is the main culprit behind security breaches and employees are at the forefront when it comes to keeping them at bay. Human error can be the result of erroneous execution of …
Certificate Authorities (CA) are an integral part of Public Key Infrastructure or PKI and are a vital component of cyber security. They are analogous to driving licensing authorities, but for the digital world, they verify the business iden…
That's why it's so important to make sure that our passwords are strong and well-managed. But what makes a password strong? And how can we effectively create and manage them? That's what we'll be expl…
Ethical hacking, also known as "white hat" hacking, is the practice of using hacking techniques to test the security of computer systems and identify vulnerabilities that could be exploited by malicio…
That’s why it’s so important to stay informed about the top types of cyberattacks and what you can do to protect yourself and your organization from these threats. In this blog post, I’ll be discussin…
What is social engineering? Social engineering is a type of cyber attack that relies on manipulating people rather than exploiting technical vulnerabilities. It is a serious threat to organizations an…
Background First two parts are related to observing process: what is it doing? Part 1 touched on Windows Process Auditing & Part 2 covered Sysmon. This part illustrates how we can use events from Event Tracing for Windows to disrupt malic…