SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which was recommended in organizations. In our second phase, we have seen the understanding and the importance of the behaviors of modern-day malware to...
Intrusion Detection System (IDS)  and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise information system through malicious activities such as DDOS Attacks or security policy violations. An IDS works...
Forensics Analysis

Live Cyber Forensics Analysis with Computer Volatile Memory

The field of computer Forensics Analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted  in an electronic or magnetic form (that is, digital evidence) You can Also Learn Computer Forensics & Cyber Crime Investigation : Using...

Intrusion Prevention System(IPS) and Its Detailed Function – SOC/SIEM – A Detailed Guide

Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic. An Intrusion Prevention System (IPS) is a framework that screens a network for evil exercises, for example, security dangers or policy compliance. Vulnerability exploits normally come...
attack chain

SOC First Defense phase – Understanding the Attack Chain – A Basic Defense approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most times, the cyber attacks are getting executed in stages. So the SOC team must...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Most Popular

Recommended