Sponsored by Keepnet Labs

How to ...?

6 Strategies that security leaders must take to safeguard data

Six Strategies that security leaders must take to safeguard data in storage and backup systems The what, why, and how of securing storage and backup The cost of a single data storage breach could overwhelmingly exceed the investment in a storage security framework and controls (we will cover financials in more detail in the next article in the series). Data-centered attacks are [...]


Posted By Category: General, How to ...?Comments: 0
Incident response with Microsoft Azure

Incident response with Microsoft Azure – Superior Guide to 1R

Incident response in the cloud As we've already learned, an incident is a service disruption that impacts your customers and end users, regardless of where this is—be it a mobile device or the cloud! We've also learned that incidents can come in many different forms, ranging from performance slowdowns to system crashes or difficulties reaching your server or service! When we look [...]


Posted By Category: Cloud Computing, Cyber Security, How to ...?Comments: 0
What is Social Engineering

What is Social Engineering ? ( free guide to SE 101 )

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick their victims [...]


Kaseya VSA Breach

Kaseya VSA Breach Consequences of Security Failures

Kaseya VSA Breach Consequences of Security Failures The world has witnessed another large-scale cyber-attack. On July 2, 2021, Kaseya, an IT Systems Management software firm, disclosed a security incident impacting their on-premises version of Kaseya’s Virtual System Administrator (VSA) software. The result was up to 1500 companies being held hostage to a significant ransom demand. Incidents such as these are becoming more commonplace. We are [...]


Kernel API Virtualization by Comodo Erdal

Kernel API Virtualization by Comodo – Uncovered (1)

Kernel API Virtualization by Comodo When it comes to securing your enterprise endpoints, it’s important to have a foundational understanding that there are three types of files: the good, the bad and the unknown. Approaches such as Antivirus (both vendor-branded “next gen” and legacy detection-based), Blacklisting and Whitelisting handle the known good and the bad files – but what about [...]


Windows 11 First Look - Erdal Ozkaya

Installing Windows 11 in 11 steps

Installing Windows 11 in 11 steps  Step by Step guide Step 1 To be able to download Windows 11 , you need to join Windows Insider Program  , to do so you have two options  Just click here and follow the steps Within Windows 10 -> Open Settings -> Click on Update & security -> Click on Windows Insider program -> Click the Get [...]


Posted By Category: How to ...?, What is new ?, WindowsTags: Comments: 0
Comodo MITRE Kill Chain

Comodo MITRE Kill Chain – Detailed 1nfo

Comodo MITRE Kill Chain Cyber Intrusion Kill Chain aka Kill Chain, has been adapted from military concepts. Locked Martin’s engineers was the first to adapt it to cyber security area. The core of framework has been arisen from the structure of attack. It describes an end-to-end process , or the entire chain of events, that is required to perform a [...]


Posted By Category: Cyber Security, How to ...?Tags: Comments: 0
Windows 11

15 Features you will love in Windows 11

15 features you will love in Windows 11 15 features you will love in Windows 11 Windows 11 is coming After nearly 6 years finally Windows is getting a major upgrade. Microsoft is promising that Windows 11 is designed to bring us closer to what we love. Satya Nadella ( CEO of Microsoft ) gave us the clue in the Build conference [...]


Posted By Category: How to ...?, What is new ?, WindowsTags: Comments: 0
Forensic

Forensic investigation of a Social Engineering attack

Forensic investigation of a Social Engineering attack In this article I am going to share with you a real Social Engineering attack , where we worked in a case to investigate if there was any forensic evidence to suggest that the laptop computer a) had been compromised by the perpetrator(s), b) if found to be compromised, how, when, and by whom [...]


Don’t let Hackers steal your password 2

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]