Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyphere

Tiny Banker Trojan

While living in the 21st century, no one can live off offline modes of payment all the time. Financial institutions, especially banks, have gone the extra mile to ease the process for their clients in the meantime, attracting cybercriminals and their ever-changing malware as threats to their information security. Tinba is one such threat especially plaguing Windows. Read on to know more about the tiny virus and its not so tiny implications.

How To Send A Secure Email In Outlook

Sensitive data leaks are too common in the headlines these days, and there is no need to waste space explaining why it is essential to secure your sensitive information. Secure encryption is one such method to ensure your email messages are encrypted to be read-only by the intended recipients. Sending an encrypted email message is the need of the hour for business or professional practice and Outlook encryption is the best possible solution available in the market.

What is the difference between a vendor and a third party vendor?

A manufacturing organisation providing direct goods and services is known as a vendor. If the same services and products are provided on behalf of a direct vendor, they are known as third-party vendors. Third-party vendors always have a direct written contract, but not each vendor and organisation works with contracts. The definition of an entity as a third-party vendor depends on the organisation hiring its services.

What is DHCP? Dynamic Host Configuration Protocol Guide

Without DHCP, it is difficult to imagine how we would be able to connect to the internet or our local network. DHCP is a vital part of how our devices on IP networks communicate with each other and the world around us. This article will cover DHCP in-depth, explaining what it is, how it works, its components, logging, configuration, and its benefits.

What is a spoofing attack? Types of spoofing and prevention measures

Spoofing attacks are on the rise. What is a spoofing attack, you ask? Essentially, it attempts to gain unauthorised access to systems, devices or networks by masquerading as a valid user. In other words, spoofing attackers try to mimic or copy the behaviour of authorised users to steal information or gain access.

CRLF Injection Attack Explained

Web applications across the digital world are teeming with vulnerabilities increasingly equipped to defeat security mechanisms. Among them are injection attacks. We are aware of the many injection vulnerabilities present in a web application, for example, SQL injection, HTML injection, CRLF injection, cross-site scripting and many others. This article will discuss CRLF injection vulnerability in detail for web application security.

What is Privileged Access Management (PAM)?

Privileged account management is the process of identifying, controlling and monitoring privileged accounts and their associated activity. Privileged accounts are typically high-level administrator accounts that have broad access rights across an organisation’s IT systems. Because of their elevated level of access, these accounts pose a significant risk if they were to fall into the wrong hands.

25+ Vulnerable websites to practice your ethical hacking skills

In recent times as the field of information is on the rise a new term ‘Ethical Hacking’ has emerged and opened many different avenues for IT and cyber security professionals. Now more and more people are getting familiar with the field of information security and are getting interested in learning about hacking skills.