Honey Pot
A honeypot is a decoy computer system for trapping hackers or tracking unconventional or new hacking methods. Honeypots are designed to purposely engage and deceive hackers and identify malicious activities…
Hackers Breach U.S. Marshals System With Sensitive Personal Data
The compromised computer system includes information on both investigative targets and agency employees. The U.S. Marshals Service suffered a significant security breach this month when hackers broke into and stole…
What is credential stuffing? | Credential stuffing vs. Brute Force Attacks
In a credential stuffing attack, collections of stolen login credentials from one service are used to attempt to break into accounts on various other services. What is Credential Stuffing? Credential…
What is a brute force attack?
What is a brute force attack? A brute force attack is a trial-and-error method used to decode sensitive data. The most common applications for brute force attacks are cracking passwords…
DNS amplification attack
DNS amplification is a DDoS attack that leverages DNS resolvers to overwhelm a victim with traffic. What is a DNS amplification attack? This DDoS attack is a reflection-based volumetric distributed…
SYN flood attack
An SYN flood exploits a TCP/IP handshake vulnerability in an attempt to disrupt a web service. What is an SYN flood attack? An SYN flood (half-open attack) is a denial-of-service…
What is a DDoS attack?
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the regular traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with…
What are IP & TCP?
The Internet Protocol (IP) is the address system of the Internet and has the core function of delivering packets of information from a source device to a target device. IP…
What is a Botnet?
A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker. A botnet (short for “robot network”) is a…