Also known as DPI, deep packet inspection is a kind of packet filtering that evaluates the data and header of a packet that is transmitted through an inspection unit to…
Read MoreAlso known as DPI, deep packet inspection is a kind of packet filtering that evaluates the data and header of a packet that is transmitted through an inspection unit to…
Read MoreIn general, corporate security policies define the information assets needed to continue corporate activities. Detecting threats to this information asset is the role of detection and response system. In addition,…
Read MoreThe threat of DDoS (Denial-of-Service) attacks that send massive processing demands from multiple Internet-connected devices (be it a PC, a smartphone, a tablet or an IoT) to the target server…
Read MoreOnce again Toyota Motor Corporation reported its second data breach. The first attack was in February, and it’s not clear whether the two incidents are related. The latest incident, revealed…
Read MoreSoftware maker and enterprise VPN provider Citrix has suffered a hack, which might have led to the hackers accessing about 6 TB of sensitive data, as per reports. The FBI…
Read Moreprocedural security is what we call operational security (OPSEC), it is kind of risk management process that encourages admin to monitor operations from the perspective of an adversary, and draw…
Read MoreCurrently, most computers are connected to the network, and various information is exchanged beyond national borders. Mobile devices such as smartphones and tablets have also been used in business, personal…
Read MoreWhat is a Secure Web Gateway (SWG)? For the perspective of a typical Joe or Jill of today’s computing, Secure Web Gateway is an alien name. However, it is simply…
Read MoreAPT32 malware has been covered here in Hackercombat recently, and we are set to update you of the latest findings from Palo Alto Networks. KerrDown, the newly developed special downloader…
Read MorePage 1 of 1