Threat Intelligence Report
Threat Intelligence: Staying Ahead Of Cyber Criminals, The threat intelligence likewise is an analysis of information collected about the cyber threat so that it provides reliable and structured information about cybersecurity threats. ReadMore
Phishing Incident Response
The playbooks define the procedures for security event investigation and response, a written guidance for identifying, containing, eradicating and recovering from cybersecurity incidents. Full file via SlideShare
Defend DDoS Attacks
DDoS attacks are making the headlines but if you architect your infrastructure right at the DNS layer, you can significantly reduce the impact. ReadMore
IT Guys Life in Hell
Pentesting: Exploiting: how the system reacts to an attack, which weak spots exist that could be breached if any, and what data could be stolen from an active system.
NotPetya Ransomware Outbreak
As I expected, On June 27, several organizations in Europe reported ransomware infecting their systems,!. The Wisdom of Crowds Intelligence Full Report -it's not over yet!
Crowd Sourced Intelligence Doc
WannaCry stopped? No, this is just the beginning. Warm up! Expect more!. Full Report All say that the threat is stopped, but this is untrue. «Kill Switch» only slowed its progress.
USB Anti Forensic Tool: USBdeath
Anti-forensic tool that writes udev rules for known usb devices and do some things at unknown usb device insertion or specific usb device removal.
Secure Unified Communication
Unified communications infrastructure threats and defense strategies and cost savings for businesses. White paper written by Naushad and Gabriela
In this White paper I outlined different approaches to VoIP security and best practices to ensure infrastructure security is intact for making VoIP security a reality by Naushad MSc - Assignment
Modern Disaster Recovery Tools
No More Excuses -I'm Building my own a Modern Disaster Recovery toolkit, How to monitor your strategy to alert you to moves, adds, and changes that may break your plan
Avoid the WPA Wireless Attack
The latest crack in wireless security, specifically, the Wi-Fi Protected Access (WPA) security standard, can threaten the safety of enterprise networks and company information or data
Security on Throughput of IEEEE
Effect of Security on Throughput of IEEE802.11b/g Protocols. Opportunistic Encryption (O-E): In this paper, I propose a framework called O-E that uses an acceptable signal to noise ratio.
9 Important Fact:Colocation
With applications supporting your key customer interactions and business functions, all aspects of your IT infrastructure must be scrutinised - including your colocation provider.
Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, I will show you some of the hidden features of the NMAP
Blocking Tor proxy [business]
Blocking Tor proxy users to your Linux server, One of the main reasons is improved security, Here we show a way to make the server appear offline only for Tor users (by sending a TCP RST packet to close the connection). ReadMore
Top 100 Hacking Books
This list for everyone who is interested in ethical hacking, beginners or professionals both. These top 100 hacking books pdf list is created based on the public reviews given for the books.