What Is Deep Packet Inspection and How Does It Work

What Is Deep Packet Inspection and How Does It Work?

Also known as DPI, deep packet inspection is a kind of packet filtering that evaluates the data and header of a packet that is transmitted through an inspection unit to…

Read More
A Simple Look At An Efficient Enterprise MDR

A Simple Look At An Efficient Enterprise MDR

In general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the role of detection and response system. In addition,…

Read More
Open EDR
DDoS Attacks Hit Games Like Assassin’s Creed and Final Fantasy XIV

How Companies Fight DDoS Attacks?

The threat of DDoS (Denial-of-Service) attacks that send massive processing demands from multiple Internet-connected devices (be it a PC, a smartphone, a tablet or an IoT) to the target server…

Read More
Yet Again Cyber Attack on Toyota Car Maker 1

Yet Again! Cyber Attack on Toyota Car Maker

Once again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the two incidents are related. The latest incident, revealed…

Read More
VPN Provider Citrix Hacked About 6 TB Data Accessed 1

VPN Provider Citrix Hacked, About 6 TB Data Accessed

Software maker and enterprise VPN provider Citrix has suffered a hack, which might have led to the hackers accessing about 6 TB of sensitive data, as per reports. The FBI…

Read More
Implementing Operational Security The Process and Best Practices

Implementing Operational Security, The Process and Best Practices

procedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…

Read More
Safe Computing Tips For Common Computer User

Safe Computing Tips For Common Computer User

Currently, most computers are connected to the network, and various information is exchanged beyond national borders. Mobile devices such as smartphones and tablets have also been used in business, personal…

Read More
Secure Web Gateway Mechanics Made Simple

Secure Web Gateway Mechanics Made Simple

What is a Secure Web Gateway (SWG)? For the perspective of a typical Joe or Jill of today’s computing, Secure Web Gateway is an alien name. However, it is simply…

Read More
Shamoon Malware from 2016 2017 Evolved With File Wiping Capability Targets Middle East Countries

APT32 Malware’s Use Of New Downloader Critical To Its Propagation Success

APT32 malware has been covered here in Hackercombat recently, and we are set to update you of the latest findings from Palo Alto Networks. KerrDown, the newly developed special downloader…

Read More

Page 1 of 1

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register