EHA
Wireshark 4.0.0 Released – What’s New!!

Wireshark 4.0.0 Released – What’s New!!

Wireshark Team launched its new version of Wireshark 4.0.0 with new enhancements & updates for Protocol Support, Updated Capture File Support, and added new features for macOS packages and Windows installers. Wireshark is widely used all...
New Malware Hijacks SOHO Routers on the Target to Steal Sensitive Information

New Malware Hijacks SOHO Routers on the Target to Steal Sensitive Information

It has been identified recently that a RAT known as ZuoRAT is hijacking SOHO routers to target remote workers. As of 2020, the RAT has been undetected by security experts and has been targeting...
The Foundation of an Effective SOC

The Foundation of an Effective SOC

Cyber-attacks and breaches of application security are commonplace in today's electronically driven economy. To combat this threat, OEMs and organizations are employing experts in the field of network and application security. However, no security...
Dangerous DNS Attacks

Top 10 Dangerous DNS Attacks Types and The Prevention Measures – 2022

From the above topic, we can guess that today, we are going to discuss the top 10 DNS attacks and how to mitigate them. DNS stands for Domain Name System which remains under constant...
Critical Samba Vulnerability Let Attackers Gain Remote Code Execution With Root Privileges

Critical Samba Vulnerability Let Attackers Gain Remote Code Execution With Root Privileges

A Virtual File System of Samba was found to be vulnerable to Remote Code Execution. Versions prior to 4.13.17 were vulnerable to this vulnerability. Samba is a piece of software used in SMB (Server...
5 Email Security Trends to Look Out For In 2022

5 Email Security Trends to Look Out For In 2022

Email security has seen drastic changes in the last few months. Pandemic-induced phishing attacks have reignited the conversation around how an average business can protect itself from cybercriminals without impacting its everyday workflow. Here...
What You Need To Know About IP Address Management Systems

What You Need To Know About IP Address Management Systems

By 2023, the number of gadgets connected to IP networks will be three times more than the global population, according to statistics on Cisco. With more devices added to networks, managing internal IP networks...
Certifications To Help Pivot into Network Security

Certifications To Help Pivot into Network Security

Network security, according to experts, is defined as rules and practices intended to prevent trespassing, unauthorized access, alteration, misuse, change, destruction, or unauthorized collection and dissemination of data held. The entire process necessitates a...
Wireshark 3.4.9 Released – What’s New!!

Wireshark 3.4.9 Released – What’s New!!

The world’s most popular network protocol analyzer Wireshark has released its new version 3.4.9 along with several bug fixes and newly updated features. Wireshark is popular network protocol analyzer. It is used for troubleshooting, analysis, development,...
SOC Framework

What is a SOC Framework, Elements & Benefits of Security Operation Centre

Security Operation Centre is always the heart of the organization in cybersecurity. When other groups mainly focus on the architecture and strategy, SOC Framework works as rubber meets to implement those strategies. As per the...