Articles

Ethical Hacking

Interview: A Cybersecurity Expert Shares His Tips for System Hacking

Interview: A Cybersecurity Expert Shares His Tips for System Hacking A conversation with Certified Ethical Hacker Nicola Kalderash https://www.youtube.com/watch?v=wPv81DDRIHQ Threat actors engage in system hacking to access sensitive data and functions, escalate privileges, run malicious code, and conceal or destroy files. We asked Certified Ethical Hacker (C|EH) Nicola Kalderash for his system hacking tips and…

Read article
Interview: Information Security Expert Explains Vulnerability Analysis

Interview: Information Security Expert Explains Vulnerability Analysis A conversation with Certified Ethical Hacker Sophia Green https://www.youtube.com/watch?v=cQaUcN3zG7c&feature=youtu.beEthical hackers use vulnerability analysis to determine an organization’s level of exposure to various cyberthreats by examining its systems and networks for flaws, weaknesses, and oversights. Certified Ethical Hacker (C|EH) Sophia Green sat down with EC-Council to explain the vulnerability…

Read article
Interview: A Security Engineer’s Guide to Ransomware Attack Response

Interview: A Security Engineer’s Guide to Ransomware Attack Response A conversation with Certified Ethical Hacker Zak Stufflebeam https://www.youtube.com/watch?v=MMt3O2lfYyc Because ransomware has become such an issue in cybersecurity, EC-Council caught up with Zak Stufflebeam to talk about ransomware attacks, trends, and responses. The other big thing is making proper backups. So, if you have a correct…

Read article
Interview: An Ethical Hacker Shares Her Tips for Successful Enumeration

Interview: An Ethical Hacker Shares Her Tips for Successful Enumeration A conversation with Certified Ethical Hacker Samira Brawner https://youtu.be/xbu3E2L3Sqs In ethical hacking, enumeration is the process of gathering information (usernames, group names, network sources, etc.) to discover potential attack vectors. It’s part of the first phase of ethical hacking and one of the most important…

Read article
Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks

Interview: An Air Force Project Manager Explains How to Understand and Prevent Ransomware Attacks A conversation with Certified Ethical Hacker John York https://www.youtube.com/watch?v=-aS2VWlTtR8Despite being just halfway through 2022, ransomware attacks have already caused significant damage this year. Last month alone, hackers targeted web hosting providers, healthcare systems, and major library services, among several other high-profile…

Read article
What Are Footprinting and Reconnaissance?
What Are Footprinting and Reconnaissance?

Understanding the Basics of Footprinting and Reconnaissance Footprinting and reconnaissance are two essential steps in any security assessment (Hunt, 2021). They help provide a blueprint of an organization’s security posture and can uncover potential vulnerabilities. This article will discuss footprinting, reconnaissance, and different types of footprinting methodologies. We will also look at what information can…

Read article
What Is Ethical Hacking? Becoming an Ethical Hacker
What Is Ethical Hacking? Becoming an Ethical Hacker

How Ethical Hackers Are Changing the Game in Cybersecurity It’s strange to think about, but imagine walking into a business and saying, “Yes, hello. I’d like to hack your entire computer network…ethically.” If the company was smart, they’d respond: “That sounds great—let’s talk.” The Need for Ethical Hacking Ethical hacking has become a highly in-demand…

Read article
Ethical Hacking: Understanding the Basics
Ethical Hacking: Understanding the Basics

Ethical Hacking: Understanding the Basics Cybercrime continues to grow at an astounding and devastating rate; more than 93% of organizations in the healthcare field alone experienced a data breach in the past few years (Sobers, 2021). While most people with any degree of tech acumen are familiar with criminal hackers, fewer are familiar with the…

Read article
The Biggest Botnet Attacks to Date
The Biggest Botnet Attacks to Date 

A Chronological Look at the Biggest Botnet Attacks of the 21st Century A botnet attack is a specific type of attack in which a malicious hacker gains control over a series of computers. These computers are then directed by the attacker to launch massive-scale cyberattacks like Distributed Denial-of-Service (DDoS) attacks. This results in harm to…

Read article
what-are-sniffing-and-sniffing
What Are Sniffing Attacks, and How Can You Protect Yourself? 

What Are Sniffing Attacks, and How Can They Be Prevented? The technique of capturing all data packets traveling through a network using a software application or hardware device is known as network sniffing (Mitchell, 2021). Ethical hackers can use sniffing to gain tremendous insights into the workings of a network and the behavior of its…

Read article