Raja SrivathsavCyberEd #25 Scareware & initial response for a scareware scamScareware is a type of malware attack that pretends to detect a virus or other problem on a device and then advises users to download or…·2 min read·Jan 14, 2023----
Raja SrivathsavinCoinmonksCyberEd #24 Crypto Malware = Crypto mining + Crypto JackingCrypto malware is a type of malware that allows threat actors to mine for cryptocurrencies on the computer or server of someone else. It…·3 min read·Jun 11, 2022----
Raja SrivathsavinCoinmonksCyberEd #23 Types of Denial of Service (DoS) AttacksA “denial of service,” also known as DoS, is the ultimate goal of a class of cyber attacks designed to render operations inaccessible…·3 min read·Jun 9, 2022----
Raja SrivathsavinCoinmonksCyberEd #22 Multi Factor AuthenticationMFA is a type of authentication in which a user must provide two or more verification factors in order to gain access to a resource such as…·3 min read·Jun 8, 2022----
Raja SrivathsavinCoinmonksCyberEd #21 Next Generation Firewalls (NGFW)A firewall is a device that monitors and filters incoming and outgoing network traffic per an organization’s previously established…·3 min read·May 31, 2022----
Raja SrivathsavinCoinmonksCyberEd #20 What are Dark Coins?We all know that Bitcoin is the most popular cryptocurrency. However, there are thousands of alternate cryptocurrencies (known as…·3 min read·May 29, 2022----
Raja SrivathsavinCoinmonksCyberEd #19 Introduction to Attack Surface ManagementAn attack surface is used to describe any part or entity of an organization’s network that an attacker can leverage to perform a cyber…·3 min read·May 21, 2022----
Raja SrivathsavinCoinmonksCyberEd #18 Access Control Lists (ACLs)An access control list (ACL) is a set of rules that determine which users or systems have access to an object or Operating System resource…·3 min read·May 19, 2022----
Raja SrivathsavinCoinmonksCyberEd #17 Fraud-As-A-Service? (FaaS)With a single click, you can now buy Distributed Denial of Service (DDoS) attacks and botnet rentals, stolen payment cards, healthcare…·3 min read·May 18, 2022----
Raja SrivathsavinCoinmonksCyberEd #16 Types of Cybersecurity?Cybersecurity is the practice or measures taken to protect electronic data from unlawful or unauthorized use. Therefore, any company should…·5 min read·May 17, 2022----