HackDig : Dig high-quality web security articles

What Is a Remote Code Execution Attack? Definition, Risks, and Mitigation Measures

A remote code execution (RCE) attack consists of adversaries remotely running code on an enterprise`s assets. Threat actors remotely inject and execute code in the victim`s device or system by using local (LAN), or wide area networks (WAN). The code can access servers or software, open backdoors, compromise data, deploy ransomware, etc.Threat actors use soft
Publish At:2023-05-15 15:43 | Read:97874 | Comments:0 | Tags:Networking

What Is a Ping Flood and How to Prevent It?

Imagine sitting at your computer, ready to work or browse the internet, only to find that your connection is suddenly sluggish or completely non-existent. You may have fallen victim to a ping flood attack – one of the most common types of cyberattacks in today’s digital landscape.In this blog post, we’ll dive into everything you need to know abou
Publish At:2023-04-27 15:43 | Read:231852 | Comments:0 | Tags:Cybersecurity Basics Endpoint security Networking

What Is Nmap and How to Use It to Enhance Network Security

Nmap is short for Network Mapper, an open-source tool used for IP and port scanning and app detection. System and network admins use it for network inventory, managing service upgrade schedules, and monitoring service uptime. At first, it was developed as a Linux tool but is now available also for Windows and MacOS.Users can also employ Nmap on less common s
Publish At:2023-03-23 09:27 | Read:278779 | Comments:0 | Tags:Cybersecurity Basics Networking security

What Is Internet Control Message Protocol (ICMP)?

The Internet Control Message Protocol (ICMP) is a protocol built into the IP suite whose main function is to allow IP-based devices to communicate error messages and exchange information about network conditions. Network administrators mainly use ICMP for network traffic analysis and troubleshooting, but it can be exploited by threat actors too, as ICMP has
Publish At:2023-02-24 12:11 | Read:223442 | Comments:0 | Tags:Cybersecurity Basics Networking

What Is Transmission Control Protocol (TCP)?

Transmission Control Protocol (TCP) is a fundamental communication protocol, used in computer networks, that does exactly what its name says: it controls how data is transmitted between two systems – the client and the server, and it makes sure this is achieved successfully.Because it has been widely used on the Internet since its inception, in the 197
Publish At:2023-02-16 08:13 | Read:294424 | Comments:0 | Tags:Cybersecurity Basics Endpoint security Networking

What Is the Nslookup Command and How Can You Use It to Improve DNS Security?

Nslookup is a command-line tool that helps you perform DNS queries. The Name Server Lookup (nslookup) command helps server administrators check DNS records. By using it they can find out data like domain names, IP addresses, the ports in use, and timeout.Computer OSs like Windows, macOS, and most Linux distributions have it as a built-in tool. So it might be
Publish At:2023-02-15 16:09 | Read:403494 | Comments:0 | Tags:Cybersecurity Basics Networking security

What Is a DNS Zone and How to Keep Safe From DNS Zone Transfer Attacks

The Domain Name System, and the DNS zones that it is composed of, are not as simple as ”the internet`s phonebook” largely used definition for DNS suggests it would be.As good as this comprehensive metaphor of a complex amount of technical processes this definition might be, it doesn`t mean it reveals all the relevant things you should know about the DNS.So l
Publish At:2023-01-20 08:12 | Read:246952 | Comments:0 | Tags:Networking

What Is Network Detection and Response (NDR)?

Early in the 2010s, Network Detection and Response (NDR) technology was developed to detect and counter evasive network threats that were difficult to stop using well-known attack patterns or signatures. NDR, also known as network traffic analysis (NTA), monitors network traffic and creates a baseline of activity using machine learning and behavioral analyti
Publish At:2022-10-28 12:06 | Read:291830 | Comments:0 | Tags:Networking

OSI Layers Explained – The “What”, “Where”, and “Why” of the OSI Model.

Three things are certain in this world – death, taxes, and networking students have to learn the OSI stack by heart. Despite being the least palatable part of networking, the layered OSI model is vital in understanding how machines communicate with others. So, because there’s nothing more thrilling than going back to the basics, this article will be dedicate
Publish At:2022-07-19 13:41 | Read:897618 | Comments:0 | Tags:Networking

How Honeypots Help IT Teams Defend against Cyber Attacks

Honeypots are designed to trick attackers into thinking they’ve found a real machine. The goal is to deceive them into committing attacks against a fake system, thereby uncovering their tactics and network behaviors. Many organizations use honeypots alongside website security software to improve their intrusion prevention and detection systems (IDPS).I
Publish At:2022-07-11 09:43 | Read:571219 | Comments:0 | Tags:Networking cyber

Tor’s (security) role in the future of the Internet, with Alec Muffett

Tor has a storied reputation in the world of online privacy. The open-source project lets people browse the Internet more anonymously by routing their traffic across different nodes before making a final connection between their device and a desired website. It’s something we’ve discussed previously on Lock and Code, and something that, sometimes
Publish At:2022-06-06 05:03 | Read:987741 | Comments:0 | Tags:Podcast Buzzfeed facebook HTTPS networking onion networking

Possible attacks on the TCP/IP protocol stack and countermeasures

Let’s look at what types of threats each layer of the TCP/IP protocol stack may be susceptible to. The task of a computer security system is to safeguard the information transmitted over the network and to adequately preserve the data stored in it.  Excluding in this discussion threats due to natural disasters, we can classify the man-made risk, t
Publish At:2021-05-07 05:20 | Read:395806 | Comments:0 | Tags:Breaking News Security Hacking networking TCP/IP

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to optimize the performance of users and solve the problem of some users unable to obtain an IP.Most routers feature an “Advanced Settings” section that manages
Publish At:2020-08-03 10:15 | Read:338615 | Comments:0 | Tags:Networking feature general security

CISCO Prime Data Center Network Manager affected by two critical flaws

Cisco èiblished two security advisories to warn customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager, Cisco warns its customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager (DCNM) that can be exploited by remote attackers for code execution and to access th
Publish At:2017-06-09 11:35 | Read:388402 | Comments:0 | Tags:Breaking News Hacking CISCO Prime Data Center Network Manage

Get all the Docker talks from Tech Field Day 12

As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group.  The final event was Tech Field Day 12 hosting in Silicon Valley. In case you
Publish At:2017-05-24 19:06 | Read:379972 | Comments:0 | Tags:Docker Education Engine Events Networking Security docker fo


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud