Cyber Security Insights: Our Blog
Our Cyber Security Insights Blog, updated every couple of days.
By peter|2022-08-06T02:56:09+01:00August 6th, 2022|Categories: Cyber Attacks Database|Tags: Penetration Testing, RFI, Web Attacks|
Remote file inclusion (RFI) is an attack targeting vulnerabilities in web applications that dynamically reference external scripts.
By peter|2022-08-06T02:50:43+01:00August 6th, 2022|Categories: Cyber Attacks Database|Tags: Backdoor, Malware, Trojan|
A backdoor is a malware type that negates normal authentication procedures to access a system.
By peter|2022-08-06T07:44:18+01:00August 2nd, 2022|Categories: News|Tags: darkweb, hidden internet, i2p, TOR|
The dark web is the hidden collective of internet sites only accessible by a specialized web browser.
By peter|2022-08-06T03:22:17+01:00August 2nd, 2022|Categories: Cyber Attacks Database|Tags: osint|
The first step in a targeted attack, or a penetration test or red team activity, is gathering intelligence on the target.
By peter|2022-08-06T07:34:22+01:00August 2nd, 2022|Categories: Cyber Attacks Database|Tags: port scan|
Port scanning is a method of determining which ports on a network are open and could be receiving or sending data.
By peter|2022-08-06T08:41:32+01:00August 1st, 2022|Categories: Cyber Attacks Database|Tags: Social Engineering, T1566 - Phishing|
Social engineering is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
Cyber EssentialsCyber Essentials PlusCyber ConsultingPenetration TestingVirtual CISOVulnerability Scanning
© 2009-2022 • All rights reserved. • Hedgehog Security Ltd