Category: Uncategorized

  • Blog
  • Category: Uncategorized

Tofsee backdoor malware is damm highly evasive and obfuscate that uses several Anti-Analysis techniques, with capabilities of a spambot and commonly realises Firewall modification and malicious service creation during execution to work with an injected svchost

Tofsee backdoor malware is damm highly evasive and obfuscate that uses several Anti-Analysis techniques, with capabilities of a spambot and commonly realises Firewall modification and malicious service creation during execution to work with an injected svchost. See the above images which was tested to explaint its workflow.

Read More

Cyber Security 360 Degree Security View

  Network Security   •Firewall management   •Network Access Control   •Security Network Design   •Unidentified Threat Management   •Remote Access Solution   •IPS / DS / PT   Data Security   •Data Encryption   •DLP – Data Leak Prevention   Infrastructure Security   •DNS Security   •Email Security   •Unified Communications   •SIEM  

Read More

Methodology used to perform Session Hijacking or “Cookie Hijacking” 

No one wants their expensive cookies to be taken. And no, we’re not referring to a thief breaking into your kitchen to steal your cookie jar’s wonderful contents. Session hijacking is the subject here. You can be unwittingly at risk from this hazardous type of cyberattack. A recent Stake study really discovered that 31% of

Read More

A Complete List of (CSS) Cyber Security Standards (Updated Jun’2022)

Information security management system (ISMS) (ISO/IEC 27000 Family) – ISO/IEC 27001, ISO/IEC 27002, ISO/IEC 27003, ISO/IEC 27004, ISO/IEC 27005, ISO/IEC 27006, and ISO/IEC 27007: These standards set the guidelines for maintaining & managing the infrastructure mainly for the company’s data centers to follow the certain legal, technical and physical policies to ensure confidentiality, integrity. Common

Read More