Blog

  • What is the Cyber Kill Chain?

    What is the Cyber Kill Chain in cyber security? Investing in cybersecurity analysis and strategy has never been more important in an era of rampant ransomware and other malicious cyberattacks. The Cyber Kill Chain Explained The cyber kill chain model is an adaptive, step-by-step process that helps organizations track, understand, anticipate, and stop cyber threats…

  • Defense against Ransomware

    Cyber-attacks, malware, and aspects of ransomware Cyber-attacks and data breaches are becoming more common, with perpetrators becoming increasingly skilled and motivated. While the growth of technology has benefited our lives, threats have surged significantly over the past two decades. This has also increased the vulnerability of systems, infrastructure, networks, and applications. The increasing digitalization and…

  • Caido – A lightweight web security auditing toolkit

    Caido – A lightweight web security auditing toolkit Caido is a new lightweight web security auditing toolkit designed to make professional-grade security testing more accessible. Since it provides a free version, it is perfect for new beginners or security students. However, it has some limitations, up to two scopes. The passionate team’s goal behind this…

  • Google Dorking

    Using Google for Advanced Searching What is Google Dorking? Google has a lot of websites that have been crawled and indexed. Your average Joe uses Google to look up Cat pictures (I’m more of a Dog person myself…). While Google will have many Cat pictures indexed and ready to serve to Joe, this is a…

  • Mitigating Malware

    Is a worm a virus? The answer is No. A worm is not a virus, although, like a virus, it can severely disrupt IT operations and cause data loss. A worm is much more severe than a virus because once it infects a vulnerable machine, it can “self-replicate” and spread automatically across multiple devices. Worms…