
- Details
- Written by: Meena
- Category: Cybersecurity PRISM
What is Lateral Movement in cyber-attacks?
Even when you do your best to protect your sensitive users, and your admins have complex passwords that they change frequently, their machines are hardened, and their data is stored securely, attackers can still use lateral movement paths to access sensitive accounts.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
It is a fact that -- all it takes is a single good credential to gain access to an organization’s infrastructure by an attacker and cause havoc there.
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data enables attackers to breach organizations and steal sensitive information.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
This post is about how security vendors handle the detection of zero-day attacks, which are exploits against previously unknown vulnerabilities.
All modern security products rely on some definition of threats.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
1. Install a good antivirus software in your laptop and phone.
2. Turn off your location. Some sites even keep track of you activities in offline world, but turning off location will at least do the least possible loss.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
The best defense is to be better prepared!
What is Patching?
In its most basic sense, patching is the process of repairing IT system vulnerabilities that are discovered after the infrastructure components have been released on the market. These patches can apply to a variety of system components, including operating systems, servers, routers, desktops, emails, client info, office suites, mobile devices, firewalls and more.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
As the cryptocurrency markets have gained value and become more mainstream in recent years, we’ve seen a digital gold rush to cryptomine for new Bitcoin, Ethereum, Monero, and more recently, Dogecoin.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
There is very serious interest in Ethical Hacking during last 4-5 years.
It has been observed that more and more companies worldwide have been hiring ethical hackers to hack their systems and show them the vulnerabilities they could found.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Let's take the example of famous breach that happened at Target Corp in 2013. In this breach hackers stole some 40 million Target credit cards by accessing data on point of sale (POS) systems. Target later revised that number to include theft of private data for 70 million customers. This was huge!

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
Email Account compromise typically happens when an employee is tricked into providing credentials through a malicious link, or an attachment that installs a keylogger (malware that steals your credentials).

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
With 100s of articles to absorb, it really takes time to understand what GDPR means, develop a plan, and put processes in place to ensure compliance.
General Data Privacy Regulation (GDPR) came fully into effect on May 28, 2018 and its impact on companies which have European operations, is huge. It applies to all businesses headquartered in the EU, as well as those outside of the region if they offer goods or services to, or monitor the behavior of, people living in EU countries.

- Details
- Written by: Meena
- Category: Cybersecurity PRISM
We run on our emotions because we are humans…
But the attackers who are good at Social Engineering, can exploit us by manipulate our emotional responses to further their own agenda. Being a cybersecurity professional you would endorse the fact that the weakest link of entire cybersecurity chain is the HUMAN…
Read more: Common Social Engineering Tactics used by Attackers
- What are Correlation Rules and How Do They Work In SIEM?
- How to Build a Cybersecurity Program from the Scratch?
- Do You Truly Understand What Is Fileless Attack?
- Why Is Threat Intelligence So Important and How Does OTX Work?
- 7 Myths About Role Of Machine Learning In CyberSecurity
- What is Incident Response Orchestration and How SIEM & SOAR work together in Cybersecurity?
- 3 Tactical Actions You Can Take To Solve The One Big Problem Of Vulnerabilities Management
- What is the Source of Top IOCs on Windows and Mac?
- Lets Decode Critical Incidence of Compromise
- What is Network Security and What Skills Do I Need?