What Is an Intrusion Prevention System

What Is an Intrusion Prevention System?

When you need a tool to find and detect malicious activity within a network, an intrusion prevention system (IPS) fills that role. They first detect any malicious activities in the…

Read More
Data Center Vulnerabilities Can Be Mitigated By Knowledgeable Operators

Data Center Vulnerabilities Can Be Mitigated By Knowledgeable Operators

We have repeatedly reported here in hackercombat.com about stories regarding email triggering malware intruding into the internal network and eventually leaking a considerable amount of personal information from data centers…

Read More
Open EDR
What Is a Rootkit Detection and Prevention

What Is a Rootkit? Detection and Prevention

Rootkits are secret computer programs that allow continuous and privileged access to a computer and actively hide its existence. The term rootkit is the combination of the two words “root”…

Read More
D Link agrees to Security Assessment to Settle FTC lawsuit

D-Link agrees to Security Assessment to Settle FTC lawsuit

D-Link has agreed to make some security enhancements that have reorganized the company’s security platform to resolve disputes from the Federal Trade Commission (FTC) because it has misinterpreted the security…

Read More
Definition and Importance of an Information Security Analyst

Definition and Importance of an Information Security Analyst

The information security analyst is an important role in any organization, since they keep sensitive information secure. They work with the different departments to find and correct any flaw with…

Read More
Aviation Equipment Major ASCO Victim of Ransomware Attack

Aviation Equipment Major ASCO Victim of Ransomware Attack

The Belgian manufacturer of aeronautical equipment ASCO was forced to close its operations in Belgium, Germany, Canada and the United States after a ransomware attack at its Zaventem plant in…

Read More
Major Vulnerabilities in HSMs Discovered

Major Vulnerabilities in HSMs Discovered

Yesterday’s announcement of this HSM hacking in the 2019 BlackHat program caused a lot of excitement for a good reason: the authors claim to have discovered unauthenticated remote attacks, giving full control of an…

Read More
Points To Consider Before Selecting a Secure Web Gateway 1

Points To Consider Before Selecting a Secure Web Gateway

Information technology has undergone a major transformation in recent years. Today, infrastructure, applications, and data – almost everything – are moving to the cloud. Whether it’s the public or private…

Read More
Puma Australia Hit With Credit Card Hack Malware 1

Puma Australia Hit With Credit Card Hack Malware

Sophisticated malware was planted by hackers on Puma Australia’s website, with the intention to steal customer’s credit card information at checkout, a security researcher found. A suspicious code tucked away…

Read More
Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable 1

Belkin Wemo Insight Smart Plug Vulnerability Remains Exploitable

If you own a smart home, then you may probably be aware of Belkin Wemo Insight smart plug. Yes, it helps you to turn off your lights and appliances, and…

Read More

Page 1 of 6

Login

Welcome! Login in to your account

Remember me Lost your password?

Don't have account. Register

Lost Password
Register