John the Ripper

John the Ripper is a password cracking tool that is used to recover passwords that have been lost or forgotten. It can be used to crack passwords for a variety of different platforms, including Windows, Linux, and OS X. John the Ripper is a free and open source tool that is available for download from … Read more

Behavior whitelisting

Behavior whitelisting is a security measure that involves only allowing known and trusted programs to access a computer or network. This is in contrast to other security measures that focus on identifying and blocking specific threats. Behavior whitelisting can be used to prevent malicious software from running on a computer or to restrict access to … Read more

Island hopping attack

An “Island hopping attack” is a type of network attack in which an attacker targets a small number of nodes in a network in order to reach a larger number of targets. This type of attack is often used to target high-value nodes in a network, such as servers or routers, in order to gain … Read more

Computer security incident response team (CSIRT)

A computer security incident response team (CSIRT) is a team of individuals who are responsible for responding to computer security incidents. These teams are usually composed of security professionals who have experience in handling these types of incidents. The main goal of a CSIRT is to contain and mitigate the effects of security incidents. They … Read more

Going dark

The term “going dark” is used to describe a situation in which a communications system becomes unavailable or difficult to monitor. This can happen for a variety of reasons, including technical problems, deliberate actions by users to make their communications more private, or government efforts to block or limit access to the system. Going dark … Read more

Threat intelligence service (TI service)

A threat intelligence service is a subscription-based service that provides organizations with real-time data and analysis about the latest cyber threats. The service helps organizations to proactively defend against attacks by providing them with information about the latest malware, phishing campaigns, and other cyber threats. The service also provides guidance on how to respond to … Read more