
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is PGP ?
PGP stands for 'Pretty Good Privacy.' Pretty Good Privacy (PGP) is an encryption system used for both sending encrypted emails and encrypting sensitive files. Since its invention back in 1991, PGP has become the de facto standard for email security.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is a VLAN?
A virtual local area network (VLAN) is used to share the physical network while creating virtual segmentations to divide specific groups. For example, a host on VLAN 1 is separated from any host on VLAN 2. Any packets sent between VLANs must go through a router or other layer 3 devices.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Lateral Movement in cyber-attacks?
Even when you do your best to protect your sensitive users, and your admins have complex passwords that they change frequently, their machines are hardened, and their data is stored securely, attackers can still use lateral movement paths to access sensitive accounts.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is a fact that -- all it takes is a single good credential to gain access to an organization’s infrastructure by an attacker and cause havoc there.
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data enables attackers to breach organizations and steal sensitive information.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This post is about how security vendors handle the detection of zero-day attacks, which are exploits against previously unknown vulnerabilities.
All modern security products rely on some definition of threats.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
1. Install a good antivirus software in your laptop and phone.
2. Turn off your location. Some sites even keep track of you activities in offline world, but turning off location will at least do the least possible loss.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The best defense is to be better prepared!
What is Patching?
In its most basic sense, patching is the process of repairing IT system vulnerabilities that are discovered after the infrastructure components have been released on the market. These patches can apply to a variety of system components, including operating systems, servers, routers, desktops, emails, client info, office suites, mobile devices, firewalls and more.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
As the cryptocurrency markets have gained value and become more mainstream in recent years, we’ve seen a digital gold rush to cryptomine for new Bitcoin, Ethereum, Monero, and more recently, Dogecoin.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There is very serious interest in Ethical Hacking during last 4-5 years.
It has been observed that more and more companies worldwide have been hiring ethical hackers to hack their systems and show them the vulnerabilities they could found.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let's take the example of famous breach that happened at Target Corp in 2013. In this breach hackers stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers. This was huge!

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Email Account compromise typically happens when an employee is tricked into providing credentials through a malicious link, or an attachment that installs a keylogger (malware that steals your credentials).
- The Sanctions Mechanism GDPR and How Can You Improve Your Chances of GDPR Compliance Success?
- Common Social Engineering Tactics used by Attackers
- What are Correlation Rules and How Do They Work In SIEM?
- How to Build a Cybersecurity Program from the Scratch?
- Do You Truly Understand What Is Fileless Attack?
- Why Is Threat Intelligence So Important and How Does OTX Work?
- 7 Myths About Role Of Machine Learning In CyberSecurity
- What is Incident Response Orchestration and How SIEM & SOAR work together in Cybersecurity?
- 3 Tactical Actions You Can Take To Solve The One Big Problem Of Vulnerabilities Management
- What is the Source of Top IOCs on Windows and Mac?