Under Attack? Contact Us Start a Free Demo

Tag: Cybersecurity 101

Total 15 Posts
Fundamentals and Basics of Cyber Security

What is a Trojan?

IntroductionThe term "Trojan" is typically derived from the ancient Greek story of Troy. Trojans work similarly to the wooden horse in the story, introducing something unexpected under a disguise. Trojans are malware disguising themselves as legitimate file to trick the victims into clicking, downloading, or installing the malicious software onto
Continue Reading

What is Malware?

What is Malware?Malware, or malicious software, refers to any program or code that infects a computer and causes damage to it. Malware is malicious software that targets and seeks to damage, disable, or destroy computers, computer networks, tablets, and mobile devices, often by taking control of a device's operations.
Continue Reading

Indicator of Compromise (IoC) vs. Indicator of Attack (IoA)

ScenarioAn organization was hacked using the SQL injection and database access through its website. After penetrating the network and machine, the attacker created an account named “daemon” and then escalated the privileges to obtain more control of the network. Then the attacker injected a malware file called “hackit.exe” into
Continue Reading
You've successfully subscribed to NetSecurity Blog
Great! Next, complete checkout for full access to NetSecurity Blog
Welcome back! You've successfully signed in.
Unable to sign you in. Please try again.
Success! Your account is fully activated, you now have access to all content.
Error! Stripe checkout failed.
Success! Your billing info is updated.
Error! Billing info update failed.