Cyber Security News
Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM
An intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations.IDS also can be referred to as a...
Forensics Tools
Live Cyber Forensics Analysis with Computer Volatile Memory
The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an electronic or magnetic form...
SOC
SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC
This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks.Most times, cyber-attacks...
SOC
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide
Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System...
Infosec- Resources
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise...
PoC
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation
What is an Indicator of Attack (IOA)IoAs is some events that could reveal an active attack before indicators of compromise become visible.The use...
SOC Resources
Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System
The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth of information it holds....
cyber security
Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR
Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM to emerge now, or...
Computer Security
SOC Third Defense Phase – Understanding Your Organization Assets
In our first phase, we have seen the basic defense mechanisms which were recommended in organizations.In our second phase, we have seen the...