Under Attack? Contact Us Start a Free Demo
Author image

Morgan Fitzgerald

14 Posts Dulles, Virginia Website
Morgan is an experienced and certified cyber security specialist with expertise in security operations, threat detection and response, forensic investigations, threat intelligence, and threat hunting.

Indicator of Compromise (IoC) vs. Indicator of Attack (IoA)

ScenarioAn organization was hacked using the SQL injection and database access through its website. After penetrating the network and machine, the attacker created an account named “daemon” and then escalated the privileges to obtain more control of the network. Then the attacker injected a malware file called “hackit.exe” into
Continue Reading

How Can Attack Surface Management (ASM) Improve Your Enterprise Security Posture?

What is an Attack Surface?An attack surface, also known as an external attack surface or digital attack surface, refers to all internet-accessible hardware, software, platforms, and cloud assets that can be discovered, exploited, and used to breach a company. A cyberattack can leverage an attacker's ability to leverage the
Continue Reading
You've successfully subscribed to NetSecurity Blog
Great! Next, complete checkout for full access to NetSecurity Blog
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.