Whether an ethical hacker or unethical hacker, the threat actor seeks information for purposes only s/he understands. Threat actors are continuous learners, expanding skills to select impossible… Read more “Reconnaissance Noise”
Tag: cyber security
When a Rouge DHCP is Active?
Dynamic Host Configuration Protocol (DHCP) is a network management protocol, running at the application layer and providing an Internet Protocol (IP) host (client) with its IP address,… Read more “When a Rouge DHCP is Active?”
Cyberthreat Real-Time Maps
Updated: 26 December 2017 How many cyber attacks occur each day around the globe? The number is astronomical, and cyber attacks are not showing signs of slowing. One… Read more “Cyberthreat Real-Time Maps”
Twists and Turns of Pen Testing: Part I of III
Learning to swim is synonymous with learning to use pen testing in cyber security management. The first step in learning to swim is to identify your goal. Two crucial goals of penetration testing is to reduce loss of data and loss of profits.
2x Leaks, 5B Breaches and Dark Web…
According to Tony Robbins, “Every problem is a gift- without problems we would not grow.” VerticalScope has had two monumental breaches in two years. VerticalScope is… Read more “2x Leaks, 5B Breaches and Dark Web…”