Skip to content
Cyber Threat Defense logo
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Tag: Cyber Threat Defense

cyber security trainings
Security Management

Guidance in Cyber Security Trainings

In the need to increase their cyber security resilience, companies start searching for cyber security trainings. This thing, in fact, is a very normal and recommended action. But there are many times when they find themselves in one of these three situations: There are too many options Trainings are too expensive and the overall quality […]

Posted on June 20, 2019June 20, 2019 Author Andrei Pusoiu Comment(0)
how to expend your attack surface
Tools review Tutorials

How to expand your attack surface

with Reverse IP lookups Often, we face a situation where we receive a domain to pentest, and after each attempt in the playbook, we still don’t find any way to get in. So, how to expand your attack surface? When you run out of options for breaking into one door, you might want to try […]

Posted on June 5, 2019July 16, 2019 Author Razvan Furdui Comment(0)
detect APT attacks
Security Management

Can we detect APT attacks?

In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT infections? The answer is yes. Yet, detecting APT attack is a real challenge and requires […]

Posted on May 21, 2019June 5, 2019 Author Veronica Mihaiu Comment(0)

Recent Posts

  • 5 Măsuri de Securitate in Era COVID-19
  • How easy is it to crack a password?
  • Guidance in Cyber Security Trainings
  • How to expand your attack surface
  • Can we detect APT attacks?

Archives

  • April 2020
  • February 2020
  • June 2019
  • May 2019
  • April 2019

Categories

  • Security Management
  • Security research
  • Tools review
  • Tutorials
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Menu

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Recent Posts

  • 5 Măsuri de Securitate in Era COVID-19
  • How easy is it to crack a password?
  • Guidance in Cyber Security Trainings
  • How to expand your attack surface

Do not miss it

A team competing in the CTF contest Cyber Threat Defense

CTFs in Cyber-Security

Posted on April 14, 2019May 7, 2019 Author Daniel Ciobanu
install-root-android-emulator

How to install and root your Android emulator

Posted on April 22, 2019June 5, 2019 Author Razvan Furdui
cyber security trainings

Guidance in Cyber Security Trainings

Posted on June 20, 2019June 20, 2019 Author Andrei Pusoiu
CA and SSL pinning protections

CA and Bypass SSL pinning protection on Android

Posted on May 5, 2019August 23, 2019 Author Razvan Furdui
CT Defense LTD | Newspaper Lite by themecentury.
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us