SOCMINT, or Social Media Intelligence, is a subset of Open Source Intelligence (OSINT) that focuses on the collection and analysis of data from social media platforms. It involves using tools and techniques to monitor conversations, synchronize social signals, and synthesize data points into actionable insights. SOCMINT is utilized by various organizations to understand public sentiment, […]
Category: Threats
What is an API?
An application programming interface (API) is a way for two or more computer programs or components to communicate with each other. It is a type of software interface, offering a service to other pieces of software.
What are the six basic intelligence sources, or collection disciplines?
There are six basic intelligence sources, or collection disciplines: Source: https://www.dni.gov/index.php/what-we-do/what-is-intelligence
What is Open-source Intelligence?
OSINT is intelligence produced by collecting and analyzing public information with the purpose of answering a specific intelligence question. Via SANS.ORG: What is Open-Source Intelligence? Open-Source Intelligence (OSINT) is defined as intelligence produced by collecting, evaluating and analyzing publicly available information with the purpose of answering a specific intelligence question. Information versus Intelligence It’s important […]
Google Group Trickery
Hackers like low-hanging fruit tricks to get victims to click on malicious links. One of the tricks includes sending the victim an email made to look like it comes from Google Groups. Here’s how it works: First, one doesn’t need a gmail account to be added to a Google group. All the hacker needs to […]
The Best Last Minute Cram Study Guide to Pass the Security+ Exam
Are you taking the Security+ exam within the next two weeks? Here is a Last Minute Cram guide I wrote based on Darrel Gibson’s Security+ book that will help you pass the exam. Don’t forget to look at the charts at the botton: DARRIL GIBSON SECURITY+ 401 SUMMARY Chapter 1 Exam Topic Review When preparing […]
What is VM detection?
Dilshan Keragala writes in his excellent 2016 SANS Paper on Detecting Malware and Sandbox Evasion Techniques that “The proposition of Malware Sandbox analysis techniques is an effective remedy to the challenge posed by malware attacks. The concept behind a malware Sandbox analysis system is to capture the malicious program sample in a controlled testing environment […]
Ethical Hacking
If you want to get your hands-on experience and your ethical hacking game on, Hacking-Lab is an excellent platform to do it on. Hacking-Lab is an online ethical hacking, computer network and security challenge platform, dedicated to finding and educating cyber security talents. Hacking-Lab is providing CTF and mission style challenges for international competitions like […]
What are Firewalls?
Firewall A host-based firewall monitors traffic going in and out of a single host, such as a server or a workstation. It monitors traffic passing through the NIC and can prevent intrusions into the computer via the NIC. Many operating systems include software-based firewalls used as host-based firewalls. Host-based firewalls provide protection for individual hosts […]
What are some common security threats?
Common Security Threats DoS (Denial of Service) – A DoS attack is a common type of attack in which false requests to a server overload it to the point that it is unable to handle valid requests, cause it to reset, or shut it down completely. There are many different types of DoS attacks including […]