Cybersecurity

Part 3 De Anonymizing Domains on the Dark Web – Favicon matching

Part 3 De-Anonymizing Domains on the Dark Web – Favicon matching

Favicon Matching The second method that is used to uncover a dark web based website on the surface internet (clear internet) is the process of "favicon matching". A favicon is…

Read more
Part 2 De Anonymizing Domains on the Dark Web – TLS Certificate Matching

Part 2 De-Anonymizing Domains on the Dark Web – TLS Certificate Matching

The first approach used by Cisco's Talos Threat Intelligence team was that of TLS certificate matching. With this approach the self signed certificate that is used by their dark web…

Read more
The Ability to De-Anonymize Domains on the Dark Web

The Ability to De-Anonymize Domains on the Dark Web

Members of the Cisco Talos Threat Intelligence team have developed 3 techniques to identify ransomware operators websites hosted on the dark web and their respective IP Addresses. This has given…

Read more
FAQ – What are YARA Rules?

FAQ – What are YARA Rules?

YARA is a pattern matching framework. It is used to identify and classify malware and other IT Security threats. It has a long standing history in the IT security landscape…

Read more
Passenger Devices Pose Cyber Security Risk to Aircraft

Passenger Devices Pose Cyber Security Risk to Aircraft

With modern day aircraft becoming so dependent on technology, one doesn't really think of them as a platform that is at risk of being hacked. With the way they are…

Read more
Eagle-Eye-T-Credit-Card-Details-Insta

Protecting your Credit Card Details

With various malicious threat actors continuously evolving their attack techniques it is becoming extremely important to keep our credit card details safe in our highly networked world. With how convenient…

Read more
Eagle-Eye-T-Cyber-Insurance

Cyber Insurance, and its Critical Role In Front Line Cyber Defenses

Cybersecurity, cyber insurance and ransomware tend to go hand in hand. Both security and insurance providers work tirelessly to reduce the impact of ransomware on businesses which is one of…

Read more
What is the Difference Between Attack Surface Management & Vulnerability Management

What is the Difference Between Attack Surface Management & Vulnerability Management

With how quickly software and businesses evolve, this causes problems with the traditional IT asset and vulnerability management practices. As a result this has opened a new technological segment known…

Read more
Red Teaming Vs Purple Teaming

Opinion – Red Teaming Vs Purple Teaming

In this post I am looking to get an idea of the following through a poll: If you were looking to start a career in cybersecurity, which would you go…

Read more
What-is-Confidential-Computing

What is Confidential Computing?

What is Confidential Computing? Confidential computing is an approach which takes advantage of secure enclave technology. This in turn enables the creation of a trusted execution environment (TEE) based on…

Read more