Skip to content
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Quick Links
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
  • 0752607204
  • info@ctdefense.com
  • Str. Fagului, nr. 83

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

How to keep your crypto wallet safe?

September 3, 2021September 3, 2021 Victor Barbat

How to keep your crypto wallet safe? As cryptocurrencies become more popular and valuable, more and more cybercriminals are turning their attention to them. There are 2 main types of crypto wallets: hot wallets and cold wallets. Hot wallets are… Read More

Security ManagementLeave a comment

How to secure web and mobile applications

July 29, 2021July 29, 2021 David Timofte

How to secure web and mobile applications Security online is crucial, and we all can imagine why. Hacks and breaches could have a huge negative impact on companies: Loss of customer trust; Financial losses; Leaked user data; Legal issues. You… Read More

Tutorialscybersecurity, pentest, sourcecode reviewLeave a comment

How to keep yourself invisible on the web?

July 16, 2021July 16, 2021 Andrei Petric

How to keep yourself invisible on the web? Did you ever wanted to be invisible? Pretty hard to achieve this in real life. But can you be invisible online? Well, there are 2 ways of doing it. One in which… Read More

Security researchLeave a comment

How to keep your identity and your personal financial information safe in 2021

July 2, 2021July 2, 2021 David Timofte

How to keep your identity and your personal financial information safe in 2021 Surfing the internet Nowadays, billions of people use the Internet and are sharing their personal information through social media and different other ways. Knowing how to keep… Read More

Security Management, TutorialsLeave a comment

How to Bypass RootBeer’s Root Detection

June 16, 2021June 16, 2021 Veronica Mihaiu

How to Bypass RootBeer’s Root Detection During the android penetration testing process, one of the challenges is to bypass root detection in order to be able to access the target application folder on the device. The most common library that… Read More

TutorialsLeave a comment

Machine Learning in the context of SIEM

May 28, 2021May 28, 2021 Vadim Otel

Machine Learning in the context of SIEM In this article we are going to see how machine learning was used to help automate a task in cyber security. In order to see if the activity in a system is generated… Read More

Security research, Tools reviewLeave a comment

Branding Protection, how we do it?

May 21, 2021October 7, 2021 Andrei Petric

Branding Protection, how we do it? Our world is surrounded by brands, even if we talk about global brands or small local brands that are trying to become popular, we see them everywhere. But why do we trust a brand?… Read More

Security Management, Security researchLeave a comment
PHP GIT REPOSITORY HACKED

PHP’s Git Server Hacked to Insert Secret Backdoor to Its Source code

March 29, 2021March 29, 2021 Andrei Pusoiu

PHP’s Git Server Hacked to Insert Secret Backdoor to Its Source code In yet another instance of a software supply chain attack, unidentified actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert… Read More

Tools reviewLeave a comment
Exchange Proxy LOGON 0 DAy

Remediation of Exchange Server Vulnerabilities

March 19, 2021July 2, 2021 Andrei Pusoiu

Guidance: Investigating and remediating on-premises Exchange Server vulnerabilities MSRC / By MSRC Team / March 16, 2021 This guidance will help customers address threats taking advantage of the recently disclosed Microsoft Exchange Server on-premises vulnerabilities CVE-2021-26855, CVE-2021-26858, CVE-2021-26857, and CVE-2021-27065, which are being exploited.… Read More

Tools reviewLeave a comment

5 Măsuri de Securitate in Era COVID-19

April 2, 2020April 7, 2020 Veronica Mihaiu

Ultima perioadă este cu siguranță una deosebită, prin care noi toți nu am mai trecut. Într-un timp relativ scurt, Covid-19 a pus o presiunea uriașă în toate domeniile de activitate. Cu toate astea, noi cei din industria cybersecurity cunoaștem cât… Read More

Security ManagementCTDefense, cyber security, cyber security Romania1 Comment

Posts navigation

Previous 1 2 3 Next

Recent Posts

  • How to get started in Cyber Security?
  • Women in CyberSecurity
  • Are we protected in modern cars?
  • Money Laundering through Crypto Methods
  • Log4j Vulnerability, how to stay safe?

Archives

  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • March 2021
  • April 2020
  • February 2020
  • June 2019
  • May 2019
  • April 2019

Categories

  • Our team
  • Security Management
  • Security research
  • Tools review
  • Tutorials
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Menu

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Recent Posts

  • How to get started in Cyber Security?
  • Women in CyberSecurity
  • Are we protected in modern cars?
  • Money Laundering through Crypto Methods
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us
Copyright © CT Defense All rights reserved.
Corporate Club by Axle Themes