Cyber Security

4 Articles
ICTKB_IMG

Command and Control (C2)

Malicious network attacks have been on the rise in the last decade. One of the most damaging attacks, often executed over DNS, is accomplished through command and control (C2). Command-and-control attacks can compromise an entire network. The...

ICTKB_IMG

OWASP Top 10

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Companies should adopt this document and start the process of...

ICTKB_IMG

What is Botnet Attack

A bot is a piece of malware that infects a computer to carry out commands under the remote control of the attacker. A botnet (short for robot network) is a network of computers infected by malware that are under the control of a single attacking...

Our site uses cookies. By using this site, you agree to the Privacy Policy and Terms of Use.