Skip to content
Cyber Threat Defense logo
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Tag: CyberThreatDefense

detect APT attacks
Security Management

Can we detect APT attacks?

In the previous post, we learned what is and how APT (Advanced Persistent Threat) attacks work. But the interesting part comes when we think about: How can we detect such complex attacks? And is there any way to detect APT infections? The answer is yes. Yet, detecting APT attack is a real challenge and requires […]

Posted on May 21, 2019June 5, 2019 Author Veronica Mihaiu Comment(0)
apt attacks
Security Management

Advanced Persistent Threat Attack and it’s morphology

Advanced Persistent Threat attack – learn what is and how it works The number of cyber attacks is increasing on the internet nowadays. It is not surprising that the World  Economic Forum and Global Risk Report placed in 2018 cyber attacks as the third most likely risk, behind extreme weather conditions and natural disasters. One […]

Posted on May 14, 2019June 3, 2019 Author Veronica Mihaiu Comment(0)
CA and SSL pinning protections
Tutorials

CA and Bypass SSL pinning protection on Android

Adding CA to an Android system and bypass SSL pinning protections are two very important steps in testing the security of different applications. After my latest article – How To Install And Root Your Android Emulator – I received a couple of questions about what to do next. In the article that I mention above […]

Posted on May 5, 2019August 23, 2019 Author Razvan Furdui Comment(0)
install-root-android-emulator
Tutorials

How to install and root your Android emulator

Mobile applications became an essential part of our lives, somehow we are dependent of them. We are using a lot of mobile applications every day. If you are lost in a new city, Google Maps gets you out of this situation. or if we want to make an appointment to the hairstylist, mobile applications assist […]

Posted on April 22, 2019June 5, 2019 Author Razvan Furdui Comment(1)
A team competing in the CTF contest Cyber Threat Defense
Security Management

CTFs in Cyber-Security

CTFs from the Cyber Security domain, or Capture-The-Flag competitions, have nothing to do with games that imply physical activity (e.g Paintball, Airsoft), but are perfect for hands-on and real-life hacking techniques, just to level up your skills.

Posted on April 14, 2019May 7, 2019 Author Daniel Ciobanu Comment(0)

Recent Posts

  • 5 Măsuri de Securitate in Era COVID-19
  • How easy is it to crack a password?
  • Guidance in Cyber Security Trainings
  • How to expand your attack surface
  • Can we detect APT attacks?

Archives

  • April 2020
  • February 2020
  • June 2019
  • May 2019
  • April 2019

Categories

  • Security Management
  • Security research
  • Tools review
  • Tutorials
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Menu

  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us

Recent Posts

  • 5 Măsuri de Securitate in Era COVID-19
  • How easy is it to crack a password?
  • Guidance in Cyber Security Trainings
  • How to expand your attack surface

Do not miss it

A team competing in the CTF contest Cyber Threat Defense

CTFs in Cyber-Security

Posted on April 14, 2019May 7, 2019 Author Daniel Ciobanu

5 Măsuri de Securitate in Era COVID-19

Posted on April 2, 2020April 7, 2020 Author Veronica Mihaiu

How easy is it to crack a password?

Posted on February 5, 2020February 5, 2020 Author Razvan Furdui
how to expend your attack surface

How to expand your attack surface

Posted on June 5, 2019July 16, 2019 Author Razvan Furdui
CT Defense LTD | Newspaper Lite by themecentury.
  • Security research
  • Tutorials
  • Tools review
  • Security Management
  • About Us
  • Contact Us