Tag: Cyber attack
December 17, 2024 |
The Largest and Most Notorious Cyber Attacks in History
Introduction to Cyber Attacks: Understanding the Global Threat
Cyber attacks are deliberate attempts to steal, alter, or destroy data or to disrupt operations and to damage the digital parts of a critical infrastructure. This blog post explores the most destructive major cyber attacks in...
November 29, 2024 |
A Comprehensive Look into Password Attacks and How to Stop Them
There are some things you want to keep private such as your bank account number, government ID number, etc. In the digital age, that includes the passwords that protect these accounts because once your account credentials are compromised, cybercriminals can get that information. That is why...
November 19, 2024 |
How to Detect and Prevent Session Hijacking
Imagine leaving your car key at a public place, only to drop your keys when exiting the vehicle. Someone picks them up and drives away. They speed through a school zone and are caught on camera. Later, the car is used in a robbery. Now, you're not only missing your car but also wrongly implicated...
October 8, 2024 |
How to Prevent Cyber Attacks: Strategies and Best Practices
Introduction to Cyber Attack Prevention
In today's digitally connected world, any organization with digital assets and internet access is vulnerable to cyberattacks. That reality has become all too pervasive in recent years. While it may not be part of your business plan, protection against...
June 25, 2024 |
SMBv3 Vulnerabilities Explained
Workplaces have evolved. While hybrid and remote work existed before COVID-19, these working arrangements became even more prevalent during and after the pandemic. Today, workplaces offer the flexibility for employees to work and access company resources from anywhere worldwide, with the Server...
November 15, 2023 |
The Ultimate Guide to Password Best Practices: Guarding Your Digital Identity
In the wake of escalating cyber-attacks and data breaches, the ubiquitous advice of "don't share your password" is no longer enough. Passwords remain the primary keys to our most important digital assets, so following password security best practices is more critical than ever. Whether you're...
August 14, 2023 |
Common Hacker Tools that Complement Mimikatz
Mimikatz is a popular post-exploitation tool that hackers use for lateral movement and privilege escalation. While Mimikatz is quite powerful, it does have some important limitations:
It requires local admin rights on the compromised machine.
Organizations can block Mimikatz from executing...
July 31, 2023 |
Lateral Movement: Attackers Techniques and Best Practices for Defending Your Organization
Introduction
Even if you have implemented a Zero Trust security paradigm for network and infrastructure security, you need to plan for the inevitable — at some point, an attacker will get into your network with the intent to deploy ransomware or cause other damage
A typical attack...
July 26, 2023 |
Why Is PowerShell So Popular for Attackers?
There is an old saying: “One person’s tool is another person’s weapon.” That is certainly true of Windows PowerShell. Included with every Windows operating system today, this powerful command-line shell and scripting language is used by IT professionals for system administration, remote...
July 6, 2023 |
Detecting Advanced Process Tampering Tactics with Sysmon v13
Sysmon is a component of Microsoft’s Sysinternals Suite, a comprehensive set of tools for monitoring, managing and troubleshooting Windows operating systems. Version 13 of Sysmon introduced monitoring for two advanced malware tactics: process hollowing and herpaderping. This article...