How to Use Netcat for Cybersecurity

Posted by Dhiraj Sharan on Aug 5, 2020 8:00:00 AM

To start a career as a security analyst, one must have a good understanding of the network and knowledge of networking tools. Let's begin with netcat.

Read More

Topics: Cyber Security, cybersecurity, netcat, Linux

How to Use Autoencoder for Anomaly Detection

Posted by Shaswat Anand on Jul 28, 2020 8:00:00 AM

In our previous blogs on Artificial Intelligence and Everyday Life, we learned the basics of how our computers can be trained to think like humans and work like them. Now let’s move on to some actual application of what we learned and understand about one of the most versatile neural network models - The Autoencoder.

Read More

Topics: Artificial Intelligence, anomalies, anomaly detection, neural networks

Natural Language Processing Dictionary

Posted by Abhishek Sinha on Jul 21, 2020 8:00:00 AM

Read More

Topics: Natural Language Processing, NLP

Bro: Security's Swiss Army Knife

Posted by Craig Jorgensen on Jul 14, 2020 8:00:00 AM

A swiss army knife is a plethora of tools wrapped up into one friendly and compact system. When describing anything as a swiss army knife, we mean they have a wide range of uses, whether it be knowledge, applicability, adaptivity, or otherwise.

Bro, the leading platform for network security monitoring, is quite an exciting ecosystem of wire-speed security analyzers and triggers. It takes a unique approach to network security monitoring, meaning it takes a bit of time to get used to it.

Bro was renamed to Zeek in 2018, but many still refer to it as "Bro." For this article, we will refer to it as "Bro." This is a gentle intro to familiarizing yourself with what Bro has to offer, complete with example code.

Read More

Topics: Bro, Zeek

Newfound Appreciation: Noam Chomsky

Posted by Craig Jorgensen on Jun 30, 2020 9:14:36 AM

We have all been there, sitting in class thinking to ourselves, "I will never use this in real life." However, life has a way of proving us wrong.

Enter Noam Chomsky

Read More

Topics: Recursively enumerable, Context-sensitive, Context-free, programming languages, Language

Hacker Tricks

Posted by Alexis Vander Wilt on Jun 30, 2020 8:00:00 AM

Looking for some top hacking techniques? Read about the most common ones below! 

Credit to Finjan.com, for more detail on this content see the original post: https://blog.finjan.com/9-common-hacking-techniques-and-how-to-deal-with-them/

Read More

Topics: Cyber Security, Ransomware, Malware, cybersecurity, Brute Force Attacks, Hacking

Dipping our toes into OpenSSL

Posted by Dhiraj Sharan on Jun 23, 2020 8:00:00 AM

What would life be without OpenSSL, can we even imagine one! 

Read More

Topics: encryption, openssl, decryption

Understanding the Elastic Stack

Posted by Niraj Markandey on Jun 16, 2020 8:00:00 AM

This blog will look into the entire Elastic Stack (Elasticsearch, Logstash, Kibana). 

Read More

Topics: Elastic, Kibana, elasticsearch, Logstash

Checklist for Securing your home-grown IT applications

Posted by Dhiraj Sharan on Jun 9, 2020 8:00:00 AM

A software application is a program or multiple programs that help end-users. Most applications use network resources, database resources, storage, and other cloud resources, to function. This connectedness is vital to keep in mind, not only how your end user may interact with the application, but also how vulnerable the application may be to malicious actors. One may use several different methods to protect the application, but a determined attacker with sufficient resources may access your application. So, how can we secure your home-grown IT applications? 

Read More

Topics: Cyber Security, it applications, security checklist

Big Data and Cybersecurity

Posted by Alexis Vander Wilt on Jun 2, 2020 8:00:00 AM

Big data can provide numerous insights to enterprises and help professionals to make informed decisions. When used in cybersecurity, big data can find trends and correlations, flag anomalies, and recognize the malicious activity. However, malicious hackers are also benefiting.  As AI and machine learning find their way into the world of malicious cyber attacks, cybercriminals are finding new and innovative ways to attack our systems. So, does big data hold the answer to combating cybercriminals?

Read More

Topics: Cyber Security, Big Data, anomalies