Secure SDLC – Secure Software Development Life Cycle

Software Development Life Cycle (SDLC) is an organized process of developing a secure application throughout the life of the project. Secure SDLC (SecSDLC) integrates security into the process, resulting in the security requirements being gathered alongside functional requirements, risk analysis being undertaken during the design phase, and security testing happening in parallel with development. Stages … Read more

The most known cyberattack frameworks: how to hunt threats.

Keep saying, the data is a greatest asset of any institution. What is data, why is it so important to keep your data away from bad actors? Data is information that can be stored, transferred or transformed to any machine or human readable form. This contains all of information related to company assets, processes and mechanisms, … Read more

JohnTheRipper vs HashCat. Who is better for password attack?

Today, I would like to show you how to hack a password protected archive using two the most popular tools JohnTheRipper vs HashCat. To do so, we will use two different setups. JohnTheRipper with Kali Linux 2023.01 The first setup is a Kali Linux virtual box: I will use pretty common 9-digits random password just … Read more

The most common attack vectors in 2022: symptoms and mitigation

Hi, folks, I would like to present my chart of the most common attack vectors in 2022. The article follows my research started in Top 10 cloud attack threads and vectors Attack vectors Symptoms Removing Mitigation Malware infection Hard drive or files are not accessibleNew file and foldersSystem restore is not function Quarantine the infected … Read more