Protocols, How They Work, Use Cases
Simple but effective “cheat sheet” on internet/networking protocols, simple examples of how they work, and use case scenarios for how a protocol would typically be used.
Your Go-To Source for Cyber Security Insights and Solutions
Simple but effective “cheat sheet” on internet/networking protocols, simple examples of how they work, and use case scenarios for how a protocol would typically be used.
Memcached can speed up websites, but a Memcached server can also be exploited to perform a DDoS attack. What is a memcached DDoS attack? A memcached distributed denial-of-service (DDoS) attack…
Twisted Pair Cables :These are a type of guided media. Alexander Graham Bell invented it. Twisted pair cables have two conductors, generally made up of copper, and each conductor has…
1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant. “We detected suspicious activity on…
SOC MANAGER: 95% false positives to scare you withIncidents at 4:45om on a FridayHas all the logs except the ones you actually need ADULT Size CostumeONE SIZE FITS MOST
What an interesting post! NOT! Too much tracking…
Okta says attackers accessed files containing cookies and session tokens uploaded by customers to its support management system after breaching it using stolen credentials. “The threat actor was able to…
“This is your pilot speaking. I’m working from home today”
Spoofed IP packets with forged source addresses are often used in attacks to avoid detection. What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets with…
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…