Under Attack? Contact Us Start a Free Demo
Author image

Morgan Fitzgerald

17 Posts Dulles, Virginia Website
Morgan is an experienced and certified cyber security specialist with expertise in security operations, threat detection and response, forensic investigations, threat intelligence, and threat hunting.

What are Rootkits?

Introduction:Rootkits are covert computer programs designed to provide unrestricted access to a computer without being detected. The term "Rootkit" is the combination of the words "root" and "kit." Originally, rootkits were the tools that granted administrators access to a computer system or network. "Root" is the term used to
Continue Reading

Indicator of Compromise (IoC) vs. Indicator of Attack (IoA)

ScenarioAn organization was hacked using the SQL injection and database access through its website. After penetrating the network and machine, the attacker created an account named “daemon” and then escalated the privileges to obtain more control of the network. Then the attacker injected a malware file called “hackit.exe” into
Continue Reading
You've successfully subscribed to NetSecurity Blog
Great! Next, complete checkout for full access to NetSecurity Blog
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.