SecurityStreets
Exploit Attempts
A computer exploit, or exploit, is an attack on a computer system, especially one that takes advantage of a particular vulnerability the system offers to intruders. Failure to install a patch for a vulnerability exposes the user to a computer exploit and the possibility of a security breach.
Social Engineering
Social engineering is the art of manipulating people so they give up confidential information. Criminals usually try to trick you into giving them your passwords or bank information that will give them access to your passwords and bank information as well as giving them control over your computer.
phishing
Phishing is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication.It is popular in cybercrimes, as it is easier to trick someone into clicking a malicious link in a seemingly legitimate phishing email .
OSINT TOOLS
Open-source intelligence tools (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, the term "open" refers to overt, publicly available sources (as opposed to covert or clandestine sources). Examples- Virustotal, Ipvoid etc.
Information Security
InfoSec is the practice of preventing unauthorized access, disclosure, disruption, modification, inspection, recording or destruction of data. To get better understanding of this domain, we should be aware of infosec terminologies like CIA triad etc.
Malware
Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware does the damage after it is implanted or introduced in some way into a target's computer and can take the form of executable code, scripts and other software.
Spreading Knowledge - Check our recent posts
Recent Posts
- CVE-2020-1967 – Segmentation fault in OpenSSL April 23, 2020
- Multiple Qakbot (Qbot) waves detected in April 2020 April 17, 2020
- Patch your Vcenter server for CVSS10.0 rated vulnerability – CVE-2020-3952 April 13, 2020
- Threat/APT groups leveraging COVID-19, novel coronavirus epidemic situation to spread malware. April 10, 2020
- GhostCat: Vulnerability In Apache Tomcat Servers March 9, 2020
- New Iranian Data Wiper Malware “ZeroCleare” Targeting Energy Sector December 13, 2019
- Magecart campaign -card stealer, online shopping no more secured September 22, 2019
- Lnkr : Indication of Compromise [ IOCs ] July 20, 2019