Cybersecurity firm FireEye announced Tuesday that a sophisticated group of hackers, likely state-sponsored, broke…
Tag:
explained
-
-
Malware
TrickBot explained: A multi-purpose crimeware tool that haunted businesses for years
by admin December 10, 2020What is TrickBot? TrickBot is one of the longest-lived botnets on the internet and…
-
Network SecuritySecurity
Mesh VPNs explained: Another step toward zero-trust networking
by admin September 16, 2020Mesh VPN software definition Mesh VPNs use a peer-to-peer architecture where every node or…
-
Malware
Windows code-signing attacks explained (and how to defend against them)
by admin September 14, 2020Code signing is a mechanism by which software manufacturers assure their consumers that they…
-
Network SecuritySecurity
RDP hijacking attacks explained, and how to mitigate them
by admin July 23, 2020RDP hijacking definition One means of compromising systems cherished by malware authors is Remote…
-
Hacking
John the Ripper explained: An essential password cracker for your hacker toolkit
by admin July 1, 2020John the Ripper definition First released in 1996, John the Ripper (JtR) is a…