Organizations are constantly under target of cyber attacks and data breaches. New attacks keep coming. Sometimes the older attacks end up working and other times, these older attacks get some modification to perform a zero-day to compromise an organization. In today’s post, we will learn about a very interesting attack - the SupplyChain attack. You can check my previous blog posts here where I discussed some good security jargons and attacks that a security professional should be aware of.
The news about a cyber attack in a big enterprise is not new. We keep on hearing about such attacks as to how millions of data are being stolen or leaked and can be found on the Dark Web. We are already aware of this scenario. As I always mention in my articles, nothing is 100% secure, so, as security professionals, it is important for us to take all the necessary precautions and be aware of the recent technologies and their respective attacks.
Lets Learn About SOAR
After learning about the kinds of threats and what could be done by an organization in the previous blog posts, we are getting into more details about the same. In this post, we will learn about SOAR which is yet another corporate jargon, that should never be missed by a security professional. Let’s break it down and understand the meaning one by one. SOAR is one solution to improve the effectiveness of cyber-security operations.
Network Access Control
In my previous blog posts , we learned about how nothing is 100% secure and how threats are finding new ways to compromise an organization. We also learned about the steps that the organization should take, to keep themselves all prepared for any kind of cyber-attack. Thus, in continuation to my previous articles, here, we will talk about who should be having access to a corporate network. And hence, the term “Network Access Control (NAC)” comes into the picture.
In our day to day lives, we keep hearing news about the data breach, accounts getting compromised, keeping our passwords stronger, and so on, what do all these remind us of??? Again, the same old thing, nothing is 100% secure. In the previous blog, I wrote about APT and inferred how such threats are compromising the organizations to a whole new level, and this is the reason why we are talking about threat intelligence.
Advanced Persistent Threats
Working in a security domain for over 2 years, one thing that I keep realizing each day is nothing is 100% secure and we can never deny this fact. The more we strive for the security of an organization’s perimeter or boundary, the less we think about the internal network scenario of the same. Sometimes, some attacks, especially the zero-days, have already penetrated through the organization’s network and are sitting in the internal network, extracting the sensitive information of the organization one by one, and we are still unaware of it.
A Short Comparison Between Solidity and Vyper
Smart contracts are made with the concept of bringing more applications of blockchain and not just sticking to being used for cryptocurrencies. They are just simple pieces of code adding logic to a problem to find the solution. Solidity is the very first programming language that is created for writing smart contracts for the Ethereum blockchain platform. And so is Vyper but vyper is not the first programming language but has been built recently.
Zero Trust Security Model
Every day we come across a new kind of vulnerability or a zero-day attack on an application. It is quite known that nothing is 100% secure. We do observe different kinds of data breaches or accounts getting compromised. And this is something unacceptable. Every organization implements a new policy based on the recent hacks or threats, that they may or may not have suffered from. And of course, there has to be a long term solution to it.
Introduction to Finite Groups
Hello Folks, This is my first post on a topic which is of my area of interest, “CRYPTOGRAPHY”. Being from a mathematics background, it always helped me in understanding the basic concepts used behind the widely used algorithms. So, here I will be sharing some knowledge about cryptography basics and the actual mathematics behind it. Don’t worry, I will not go harsh on you 😉 The goal of my post is to give a basic insight of Finite Group upon which the entire cryptography is based.
SpidersecNinja XSS Challenges Walkthrough
Introduction: XSS challenges have always been tricky kinds of challenges, especially the ones where your normal payload would never work and you have to go through different kinds of tags, attributes, and event handlers to craft your XSS payload. DOM-based XSS challenges are no different, the only difference is, you need to analyze a bit more to understand the kind of payload to be crafted to execute it.
Understanding AES Part2
Hello Peeps, Sorry for such a late post. But now in this post, I will deep dive into the internals and the structure of the AES Algorithm. Since we have discussed with the basic definition of AES, we will get into details this time. As we know, AES is the most important symmetric key algorithm widely used in the world. We will try to understand the structure and internals of AES.
Understanding AES Part1
Hello Peeps, AES is an algorithm widely used for different applications. It is an encryption algorithm and not used for creating hashes that means you can decrypt a data using the algorithm which is not possible in case of hashes. 🙂 AES is a symmetric key algorithm which means that it uses only one key for both encryption and decryption of the data. We will deep dive into each and every part of the mechanism to understand its working.