Skip to content
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Quick Links
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • 0752607204
  • info@ctdefense.com
  • Str. Fagului, nr. 83

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Month: February 2022

  • Home
  • 2022
  • February

Money Laundering through Crypto Methods

February 11, 2022February 11, 2022 David Timofte

Money Laundering through Crypto Methods Money laundering is referring to the process of making and masking large amounts of money generated by criminal activity, as if it has come from a legitimate source. Through the process of “laundering”, dirty money… Read More

Security researchLeave a comment

Log4j Vulnerability, how to stay safe?

February 11, 2022February 11, 2022 Renata Metes

Log4j Vulnerability, how to stay safe? Apache Log4J As the number of cybersecurity attacks is increasing at every moment, we have to be aware of the new vulnerabilities that can affect us. On November 24, 2021, a zero-day vulnerability was… Read More

Security Management, Security researchLeave a comment

Recent Posts

  • Misleading HTTP Status codes and how I got my first CVEs
  • How to protect your systems against recent Threat Actor’s activity?
  • The role of Cyber Ops in a shooting war
  • How to get started in Cyber Security?
  • Women in CyberSecurity

Archives

  • November 2022
  • August 2022
  • July 2022
  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • March 2021
  • April 2020
  • February 2020
  • June 2019
  • May 2019
  • April 2019

Categories

  • Our team
  • Security Management
  • Security research
  • Tools review
  • Tutorials
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Menu

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Recent Posts

  • Misleading HTTP Status codes and how I got my first CVEs
  • How to protect your systems against recent Threat Actor’s activity?
  • The role of Cyber Ops in a shooting war
  • How to get started in Cyber Security?
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Copyright © CT Defense All rights reserved.
Corporate Club by Axle Themes