Psychological motivation and aspects of an Insider attack

Psychological motivations behind any attack are based upon the behaviour of the attacker. Most attacks are carried out with malicious intent. The basic key motivations behind stay sure data breach attack are as follows: Revenge: Attack with this psychological is performed by people to take revenge with the company for any previous event. These actions …

Psychological motivation and aspects of an Insider attack Read More »

Tips for Malware Analysis

Malware analysis is the process of investigating a sample malware with different tools and procedures. Malware analysis can be performed with a variety of goals. The major reasons are analysing the damage from malware, finding indicators of compromise, determining the sophistication level of the malware author, identifying the vulnerability and finding intruders or insider responsible …

Tips for Malware Analysis Read More »

Popular Vulnerability scanning and Testing Tools

These commercial and publicly available tools are used during testing. Below are the basic useful details of Tools Famous Tools Burpsuite ZAP Technique These are like proxy server. All HTTP/S traffic from the browser passes through these tools. It populates the Proxy history and Target site map with all of the content requested, Functions to use Spider Scanner Intruder …

Popular Vulnerability scanning and Testing Tools Read More »