The Latest From Aleph Tav Technologies



Life Cycle of a Cyber Threat

Friday January 20, 2017

article image

Majority of organizations persist in using the conventional procedure like mercantile security products to prevent faulty websites and malicious software. In spite of the fact that it is effective against few threats, the approach fails to prevent advanced attacks and is unfit to provide awareness about tactics of the attack. Organizations should follow a threat […]

The post Life Cycle of a Cyber Threat appeared first on Ethical Hacking | Penetration Testing | Managed Security.

Protect Your Android Apps from Backdoor

Tuesday December 20, 2016

article image

The Android operating system influences OS security controls to protect user data, system resources, device integrity against malware, and provides application isolation. Android devices which contains firmware is vulnerable through a debugging feature left inside the bootloader acts as a backdoor and bypasses the authentication procedures. A backdoor is a security risk because there are […]

The post Protect Your Android Apps from Backdoor appeared first on Ethical Hacking | Penetration Testing | Managed Security.

Are You Capturing Indicators of Compromise the Right Way?

Wednesday December 07, 2016

article image

In a threat environment, rapid communication of real time threat information is the key to detect, respond to and contain targeted attacks in a short time. Aberrant activities such as port scans, planted malware or spear phishing on the network or miscellaneous hints on system can help enterprises to cite attacks. After the identification of […]

The post Are You Capturing Indicators of Compromise the Right Way? appeared first on Ethical Hacking | Penetration Testing | Managed Security.

HTTP verb tampering is a serious threat, oft-ignored

Thursday November 17, 2016

article image

Application Security Threat Research Series – Part 2: HTTP Verb Tampering Anybody with a flourishing business goes paranoid every now and then that a begrudging party might unleash an attack with the motive of bringing down the reputation of their brand. While it isn’t always easy to stop meddlers, many companies fail to pay attention […]

The post HTTP verb tampering is a serious threat, oft-ignored appeared first on Ethical Hacking | Penetration Testing | Managed Security.

SDN Security: Protecting virtualized networks from cyber attacks

Friday October 14, 2016

article image

The boom of hybrid cloud, BYOD and private virtual clouds are upon us, and as the use of bandwidth-intensive enterprise applications spiking, many large players are spearheading the adoption of Software Defined Networks (SDN) for flexibility, availability and performance. After all the initial skepticism was put to rest, it is quite clear that SDN is here to […]

The post SDN Security: Protecting virtualized networks from cyber attacks appeared first on Ethical Hacking | Penetration Testing | Managed Security.