Research June 3, 2015 Stopping the Next Massive Cyberattack – Step 3: Implement Security Controls After assessing network strengths and weaknesses and building a properly segmented network, the next step ...
Research May 22, 2015 Stopping the Next Massive Cyberattack – Step 2: Segmentation When it comes to cybersecurity, conducting a thorough assessment of your current environment to identify ...
May 20, 2015 Check Point Threat Alert: Logjam Executive Summary A major flaw was discovered with SSL and was named “Logjam”. The flaw ...
May 20, 2015 Storm Kit – Changing the rules of the DDoS attack Background Distributed denial of service (DDoS) is one of the most commonly used cybercriminal methods. ...
May 14, 2015 Analysis of the Havij SQL Injection tool Havij, an automatic SQL Injection tool, is distributed by ITSecTeam, an Iranian security company. The ...
Research May 12, 2015 The 1st Step to Stopping the Next Massive Cyberattack: Assess Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices ...
May 12, 2015 The Microsoft Help File (.chm) May Enslave You “Microsoft Compiled HTML Help” is a Microsoft proprietary online help format that consists of a ...
Security May 7, 2015 The Latest SQL Injection Trends SQL injection attacks, in which malicious SQL statements are inserted into an entry field for ...
Research May 6, 2015 Using Collaboration to Stop the Next Massive Cyberattack Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization ...
Research April 24, 2015 Stopping the Next Massive Cyberattack Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, ...