Defense

7 Results / Page 1 of 1

Malware artifact/IOC

today

close

SOC + Cybersecurity + Defense + blog Z. Oualid

What are malware artifacts ?

In the intricate landscape of cybersecurity, understanding the concept of malware artifacts is paramount for safeguarding digital environments. All malwares has their own digitale signature that is represented by their artifacts, that can be used to detect them in infected machines. So, what are malware artifacts? Malware artifacts are traces ...

CVE check

today

close

Cybersecurity + Defense + blog Z. Oualid

Do all vulnerabilities have CVE?

CVE is a very popular word in the cyber security industry. If you take any penetration test or any vulnerability assessment report, you will find a bunch of CVEs for every asset. However, does this means that all the vulnerabilities have a CVE? According to the vulnDB database of discovered ...

biometric data could be used in a two factor authentication system.

today

close

Cybersecurity + Defense + blog Z. Oualid

Two factor authentication meaning

Due to the increase of the cyberattack around the glob, many companies have started to implement what we call the Two factor authentication or multifactor authentication system. Two factor authentication (2FA) system, is a subtype of a more general system called Multifactor authentication. Multifactor authentication is the process of using ...