Category: Ethical Hacking

Find out here the latest updates and information about ethical hacking, cyber security, IT Security and other related stuff of DICC.

What Is a DDoS Attack And What Are Its Consequenses.

3 January 2022 By Rahul Garg

A distributed denial of service attack or DDoS (for its acronym in English), is an extension of a denial of service (DoS) attack that is carried out from the generation of a large flow of information or requests from various sources towards a specific goal. The difference between one and the other lies in the […]

The Top 5 Common Scam Models On Instagram.

3 January 2022 By Rahul Garg

Instagram is one of the most popular social networks. In fact, with more than 1 billion monthly active users, it is one of the four most popular social platforms in the world. However, these numbers also attract cybercriminals such as bees to honey, which they see in such a large number of users as potential targets of […]

What Is A Downloader A Type Of Trojan That Only Downloads Malware.

30 December 2021 By Rahul Garg

A downloader is a type of Trojan whose only functionality is to download one or more computer threats, who will be in charge of carrying out the malicious actions that the cybercriminal is looking for. Although a downloader does not contain a malicious payload itself, which helps it evade detection, this malware is considered both a method of propagation and […]

What Is Cyber Threat Intelligence.

29 December 2021 By Rahul Garg

there is no clear definition that describes what threat intelligence is, which often leads to the misuse of this concept. We can say that Cyber ​​Threat Intelligence, also known simply as CTI, refers to the set of organized data on computer threats that allows to prevent or mitigate possible attacks. Many teams in the operations sector receive large […]

How To Scan Network Traffic With Brim For Malicious Activity.

29 December 2021 By Rahul Garg

Malware analysis is a difficult and complex task. For this, it is essential to have various tools that allow processing and interpreting large volumes of data to simplify the analysis work. Fortunately, when it comes to analyzing network traffic for malicious activity, there are very good tools available, such as Wireshark or NetworkMiner , which are well known and for which […]

Why Machine Learning Is Great Elly For Cyber Security.

28 December 2021 By Rahul Garg

Although we have spoken on several occasions about Machine Learning and even our Augur product , this time we will do a little theoretical review for those who are not so familiar with this technology. What is Machine Learning? The machine learning , English Machine Learning (ML), is a branch of science that allows computers through a set of techniques […]

What Every Business Leader Should About Log4Shell.

28 December 2021 By Rahul Garg

In many cases, updating IT systems and installing security patches is a quiet affair with little concern for business leaders as they are more keen to get a budget approved so that the IT team can carry out this task. However, that silent approach is sometimes disrupted when a news flash emerges about a company […]

SS7 Hacking How Hackers Interrupt Your Call And Data.

27 December 2021 By Rahul Garg

Have you ever wondered how your calls always connect with the person you want to contact? That is because of SS7 (Signalling System 7). Today I am going to tell you all about SS7 protocol and SS7 HACKING that you should know and how hackers are using to steal your information. What is SS7? Signalling System 7 (SS7) or Common Channel Signalling […]

Ransomware To Pay Or Not To Pay Is It Legal Or Illegal.

27 December 2021 By Rahul Garg

The large number of cases of victims who decided to pay the ransom after being hit by ransomware do not reflect the best way to use the budgets allocated for cybersecurity or shareholder capital, nor the best way to use the funds provided by the insurance industry. So why have so many companies decided to pay, […]