Cross-discipline Security Activities: Analyzing And Responding To Siem Alerts

The general thrust of this paper is to introduce entry-level cybersecurity analysts to a scenario that they might have to deal with in a real-world job. We will start with a broad overview of the many skills that a cybersecurity analyst should possess and then cover the actual investigation. Our scenario is an APT threat that was discovered while reviewing alerts received from a SIEM. It details the indicators of compromise (IOCs) and how an analyst would go about investigating such an alert utilizing a variety of tools….

Download Now

MACHINE LEARNING – LEARNING CYBERSECURITY

Today, in this evolving world of technology, we learn something new every day. One technology that is growing in importance is machine learning (ML). ML technology has been integrated into multiple industries but, in this white paper, we will be focusing on ML in cybersecurity. Because of the volume of malware being created and used for malicious hacking…

Download Now

Vulnerability Scanning: Open Source Web Application Vulnerability Scanning Tools

No enterprise is simply too small to avoid a cyber attack or information breach. Unfortunately, smaller organizations might not have the finances and in-house expertise to harden their systems and networks towards cyber threats.

Most companies are already implementing vulnerability scans in their enterprise, understanding the importance of doing so before reaching out to the public. The obvious advantage to using an open source tool of any kind is that it usually lacks any type of price tag…

Download Now

Honeytokens As Active Defense

Web applications are one of the most attacked platforms today [8]. Due to their diversity and widespread use, new ways to break into the web applications are being invented almost daily. These break ins allow attackers to steal user’s personal data, credit card numbers, and conduct many other frauds related to data and applications hosted on the Internet servers and databases….

Download Now

5 phases every hacker must follow

Phase 1—Reconnaissance Reconnaissance refers to the preparatory phase where an attacker gathers as much information as possible about the target prior to launching the attack. Also in this phase, the attacker draws on competitive intelligence to learn more about the target. This phase may also involve network scanning, either external or internal, without authorization….

Download Now

Write for Us