-
Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA
Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…
-
What is XDR vs EDR vs MDR? Extended Detection and Response Explained
EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network…
-
What is Machine Learning ? A.I., Models, Algorithm and Learning Explained
What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine…
-
What is Open-Source Intelligence (OSINT)?
What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…
-
Active Reconnaissance: Overview, Methodology and Tools
Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…
-
What Is SASE? Secure Access Service Edge Explained
Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal…




