Attack Detection

  • Phishing for information, Part 2: Tactics and techniques
    Attack detection Jun 24, 2022 6 min

    Phishing for information, Part 2: Tactics and techniques

    As explored in Part 1, phishing is a social engineering attack in which attackers prey on human error and the vulnerability...

    Read more 
  • Demystifying SQL injection attacks
    Attack detection Jun 22, 2022 5 min

    Demystifying SQL injection attacks

    With the ever-evolving threat landscape, cyberattacks have become more sophisticated; malicious actors are carrying out more advanced...

    Read more 
  • Deepfake technology: An emerging cybersecurity threat
    Attack detection Jun 21, 2022 5 min

    Deepfake technology: An emerging cybersecurity threat

    Deepfake technology, which was recently identified as becoming a credible cyberthreat, emphasizes the notion...

    Read more 
  • 3 top insider threat examples and ways to stay ahead of them
    Attack detection Jun 8, 2022 5 min

    3 top insider threat examples and ways to stay ahead of them

    A large percentage of cybersecurity resources are spent on identifying and mitigating external threats.

    Read more 
  • Zero-day attacks demystified
    Attack detection Jun 7, 2022 5 min

    Zero-day attacks demystified

    NIST defines vulnerability as a weakness in an information system, system security procedures, internal controls, or implementation of technology...

    Read more 
  • Taking a pessimistic approach to security through threat hunting
    Attack detection Jun 6, 2022 5 min

    Taking a pessimistic approach to security through threat hunting

    When it comes to threat detection, you need to understand that it is only a fraction of your security strategy—the part of your...

    Read more 
  • Understanding RaaS: It's not like your typical Ransomware
    Attack detection Jun 6, 2022 5 min

    Understanding RaaS: It's not like your typical Ransomware

    Ransomware attacks are nothing new and they continue to be a growing threat for organizations globally...

    Read more 
  • Phishing for information, Part 1: Origin and evolution
    Attack detection Jun 2, 2022 6 min

    Phishing for information, Part 1: Origin and evolution

    When 16-year-old Koceilah Rekouche, aka Da Chronic, and his friends decided to trick AOL employees into...

    Read more 
  • HermeticWiper: Detection and mitigation
    Attack detection May 25, 2022 5 min

    HermeticWiper: Detection and mitigation

    On February 23, 2022, just hours before the Russian invasion, several Ukrainian enterprises were hit with a ransomware note...

    Read more 
  • Cryptojacking demystified: Part 2
    Attack detection May 18, 2022 6 min

    Cryptojacking demystified: Part 2

    Hi, there! It's great to engage with you again. If you're excited to learn how to prevent and detect cryptojacking, you won't be disappointed.

    Read more 
  • Going beyond pentesting: Understanding breach attack simulations
    Attack detection May 11, 2022 5 min

    Going beyond pentesting: Understanding breach attack simulations

    So you've set up comprehensive audit policies that will effectively help you...

    Read more 
  • Cryptojacking demystified: Part 1
    Attack detection May 11, 2022 6 min

    Cryptojacking demystified: Part 1

    In this two-part blog series, we'll tackle various aspects of cryptojacking, from definition to detection. You'll get a clear picture of why you should be concerned about cryptojacking...

    Read more 
  • Know your enemy: A deep dive into the attacker's mind
    Attack detection Apr 29, 2022 6 min

    Know your enemy: A deep dive into the attacker's mind

    With the ever-evolving threat landscape, cyberattacks have become more sophisticated...

    Read more 
  • Responding to cyberattacks in 2022: How 3 government institutions handled massive cybersecurity breaches
    Attack detection Apr 19, 2022 6 min

    How 3 government institutions handled massive cybersecurity breaches

    Before, national security measures mainly involved arms, missiles, and weaponry....

    Read more 
  • The WannaCry attack: Anatomy decoded
    Attack detection Apr 12, 2022 4 min

    The WannaCry attack: Anatomy decoded

    The WannaCry ransomware attack was a global cyberattack in May 2017 that affected more than...

    Read more 
  • Tricks up malware's sleeve: Understanding malware polymorphism and metamorphism
    Attack detection Mar 31, 2022 4 min

    Tricks up malware's sleeve: Understanding malware polymorphism and metamorphism

    Okay, I'm just going to come out and say it—malware is cool! Yes, it's a pain, and yes...

    Read more 
  • Supply chains: The new target of cybercriminals
    Attack detection Mar 16, 2022 4 min

    Supply chains: The new target of cybercriminals

    Last year, the European Union Agency for Cybersecurity analyzed 24 cyberattacks that had taken place and it was...

    Read more 
  • Know what the recent REvil busts mean for future ransomware attacks
    Attack detection Mar 17, 2022 6 min

    Know what the recent REvil busts mean for future ransomware attacks

    Aptly named after the horror video game series Resident Evil, REvil (Ransom and Evil), is a Ransomware as a Service (RaaS)...

    Read more 
  • How far do hat colors go in citing hackers?
    Attack detection Mar 11, 2022 6 min

    How far do hat colors go in citing hackers?

    A Gartner report notes that we could soon see physical retaliation from the nation state victims of cyberattacks in the form of wars.

    Read more 
  • 5 potential indicators of insider threats
    Attack detection Mar 09, 2022 6 min

    5 potential indicators of insider threats

    With the upswing in cyberattacks from malicious individuals or groups attempting to exploit corporate vulnerabilities and sensitive information...

    Read more 
  • Demystifying the 5 stages of ransomware
    Attack detection Feb 14, 2022 4 min

    Demystifying the 5 stages of ransomware

    Understand the different stages in which ransomware penetrates into a network and causes vast disruption to the organization.

    Read more 
  • phishing-malware-valentines-day-2022
    Attack detection Feb 14, 2022 6 min

    Hackers embrace their love for phishing this Valentine's Day

    If you are a small business in retail, health care IT, or any industry for that matter, it is time to wake up and smell the roses.

    Read more 
  • Attack detection Sep 7,2021 6 min

    Lateral movement: Detecting access token manipulations

    Imagine you just landed at your dream tourist destination and want to check in to your pre-booked hotel room. You confirm your identity

    Read more 
  • Attack detection Mar 7,2021 6 min

    Detecting intrusions on public-facing applications and machines

    The term "public facing" refers to an application or system that is not only accessible from within

    Read more 
  • Attack detection Mar 7,2021 6 min

    Controlling the ransomware rampage

    In recent years, ransomware attacks have become common enough—and expensive enough—to solidify ransomware's position as a boardroom risk. These attacks exploit

    Read more 
  • Attack detection Mar 7,2021 4 min

    Detecting credential stuffing and lateral movement attacks

    The cybersecurity threat landscape is always evolving, and organizations need to stay on top of its developments

    Read more 
  • Attack detection Mar 7,2021 6 min

    Building resiliency against DDoS attacks

    Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks are growing larger, more sophisticated,

    Read more 
  • Attack detection Sep 13,2021 4 min

    Detecting domain controller authentication modifications

    Authentication is the procedure to validate the digital identity of the requester or sender of the information.

    Read more 

Get the latest content delivered
right to your inbox!

Thank you for subscribing.

You will receive regular updates on the latest news on cybersecurity.

  • Please enter a business email id
  •  
  •  
    By Keep me Updated you agree to processing of personal data according to the Privacy Policy.

EXPERT TALKS

     
     

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.