A remote code execution (RCE) attack consists of adversaries remotely running code on an enterprise`s assets. Threat actors remotely inject and execute code in the victim`s device or system by using local (LAN), or wide area networks (WAN). The code can access servers or software, open backdoors, compromise data, deploy ransomware, etc.Threat actors use soft
Publish At:
2023-05-15 15:43 |
Read:97874 | Comments:0 |
Tags:
Networking
Imagine sitting at your computer, ready to work or browse the internet, only to find that your connection is suddenly sluggish or completely non-existent. You may have fallen victim to a ping flood attack – one of the most common types of cyberattacks in today’s digital landscape.In this blog post, we’ll dive into everything you need to know abou
Nmap is short for Network Mapper, an open-source tool used for IP and port scanning and app detection. System and network admins use it for network inventory, managing service upgrade schedules, and monitoring service uptime. At first, it was developed as a Linux tool but is now available also for Windows and MacOS.Users can also employ Nmap on less common s
The Internet Control Message Protocol (ICMP) is a protocol built into the IP suite whose main function is to allow IP-based devices to communicate error messages and exchange information about network conditions. Network administrators mainly use ICMP for network traffic analysis and troubleshooting, but it can be exploited by threat actors too, as ICMP has
Transmission Control Protocol (TCP) is a fundamental communication protocol, used in computer networks, that does exactly what its name says: it controls how data is transmitted between two systems – the client and the server, and it makes sure this is achieved successfully.Because it has been widely used on the Internet since its inception, in the 197
Nslookup is a command-line tool that helps you perform DNS queries. The Name Server Lookup (nslookup) command helps server administrators check DNS records. By using it they can find out data like domain names, IP addresses, the ports in use, and timeout.Computer OSs like Windows, macOS, and most Linux distributions have it as a built-in tool. So it might be
The Domain Name System, and the DNS zones that it is composed of, are not as simple as ”the internet`s phonebook” largely used definition for DNS suggests it would be.As good as this comprehensive metaphor of a complex amount of technical processes this definition might be, it doesn`t mean it reveals all the relevant things you should know about the DNS.So l
Publish At:
2023-01-20 08:12 |
Read:246952 | Comments:0 |
Tags:
Networking
Early in the 2010s, Network Detection and Response (NDR) technology was developed to detect and counter evasive network threats that were difficult to stop using well-known attack patterns or signatures. NDR, also known as network traffic analysis (NTA), monitors network traffic and creates a baseline of activity using machine learning and behavioral analyti
Publish At:
2022-10-28 12:06 |
Read:291830 | Comments:0 |
Tags:
Networking
Three things are certain in this world – death, taxes, and networking students have to learn the OSI stack by heart. Despite being the least palatable part of networking, the layered OSI model is vital in understanding how machines communicate with others. So, because there’s nothing more thrilling than going back to the basics, this article will be dedicate
Publish At:
2022-07-19 13:41 |
Read:897618 | Comments:0 |
Tags:
Networking
Honeypots are designed to trick attackers into thinking they’ve found a real machine. The goal is to deceive them into committing attacks against a fake system, thereby uncovering their tactics and network behaviors. Many organizations use honeypots alongside website security software to improve their intrusion prevention and detection systems (IDPS).I
Publish At:
2022-07-11 09:43 |
Read:571219 | Comments:0 |
Tags:
Networking cyber
Tor has a storied reputation in the world of online privacy. The open-source project lets people browse the Internet more anonymously by routing their traffic across different nodes before making a final connection between their device and a desired website. It’s something we’ve discussed previously on Lock and Code, and something that, sometimes
Let’s look at what types of threats each layer of the TCP/IP protocol stack may be susceptible to.
The task of a computer security system is to safeguard the information transmitted over the network and to adequately preserve the data stored in it.
Excluding in this discussion threats due to natural disasters, we can classify the man-made risk, t
In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to optimize the performance of users and solve the problem of some users unable to obtain an IP.Most routers feature an “Advanced Settings” section that manages
Cisco èiblished two security advisories to warn customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager,
Cisco warns its customers of the presence of two critical vulnerabilities in the CISCO Prime Data Center Network Manager (DCNM) that can be exploited by remote attackers for code execution and to access th
As 2016 comes to a close, we are excited to have participated in a few of the Tech Field Day and inaugural Cloud Field Day events to share the Docker technology with the IT leaders and evangelists that Stephen Foskett and Tom Hollingsworth have cultivated into this fantastic group. The final event was Tech Field Day 12 hosting in Silicon Valley.
In case you
Announce
Share high-quality web security related articles with you:)