Archive for the ‘Network security’ Category

Wireshark 4.0.3 Released – What’s New!

The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3.  This version boasts a multitude of improvements, including new features and updates, as well as the resolution of various bugs to ensure a smooth and efficient user experience. The Wireshark packet analyzer is a free and open-source application that […]

Leave a Comment

Most Important Network Penetration Testing Checklist

Network Penetration Testing determines vulnerabilities in the network posture by discovering Open ports, Troubleshooting live systems, services and grabbing system banners. The pen-testing helps administrator to close unused ports, additional services, Hide or Customize banners, Troubleshooting services and to calibrate firewall rules.You should test in all ways to guarantee there is no security loophole. Let’s see how […]

Leave a Comment

Network Security Checklist

Network Security Checklist via Ethical Hackers Academy Network Security Assessment: Know Your Network InfoSecBooks & Tools

Leave a Comment

Wireshark 4.0.1 Released – What’s New!!

A new version of Wireshark has been released recently by the Wireshark Team, it’s Wireshark 4.0.1, which contains several enhancements, new updates, and bug fixes. Wireshark is one of the most widely used open-source free software packet analyzers that are currently available on the market, and it is available in a variety of options for […]

Leave a Comment

WireShark 4.0.0 Released – What’s New?

There are several open-source packet analyzers available, but Wireshark is among the most popular. Moreover, the application has been upgraded to version 4.0.0 and comes with multiple new features and fixes. It is not only network administrators who use Wireshark packet analyzers to analyze packets, but also security analysts to analyze packets. Wireshark network protocol […]

Leave a Comment

Network Infrastructure Security Guidance

Building a Future-Proof Cloud Infrastructure: A Unified Architecture for Network, Security, and Storage Services

Leave a Comment

A comparison of NDR solutions: Deep packet inspection (DPI) vs. metadata analysis

DPI has become popular since it provides very detailed traffic analysis. However, this approach requires designated hardware sensors and large amounts of processing power, while at the same time being blind to encrypted network traffic and only analysing data flowing over the mirrored infrastructure. Metadata analysis (MA) overcomes these limitations to provide detailed and insight-enriched […]

Leave a Comment

How Does An IPv6 Proxy Work & How Enterprises Can Get Benefit?

Technological advancements have come a long way – from when internet utility was very limited to when internet connection was achieved only through internet protocol (IP) version 4 (IPv4) addresses to this modern age where IPv6 is the next big thing. IPv6 stands for internet protocol version 6, as you might have figured out by now, and […]

Leave a Comment

WireShark Cheat Sheet

Learn Wireshark: Confidently navigate the Wireshark interface and solve real-world networking problems

Comments (2)

WireShark Cheat sheet

Leave a Comment

Ways to Improve Internet Speed

A slow-speed internet that makes you wait for ages before you can finally access a webpage is surely quite a pain! It tests your patience to the last limits and doesn’t allow you to complete your work on time. It is equally frustrating for game lovers, who always need an active internet connection to play […]

Leave a Comment

Poisoned proxy PACs! The NPM package with a network-wide security hole

Not long ago, independent software developer Tim Perry, creator of the HTTP Toolkit for intercepting and debugging web traffic… …decided to add proxy support to his product, which, like lots of software these days, is written using Node.js. ICYMI, Node.js is the project that took the JavaScript language out of your browser and turned it into a full-blown application development […]

Leave a Comment

Don’t Leave Security to the Network

Key Strategic Criteria The solution is, instead, to focus on building applications that are secure by design, with zero-trust security baked-in rather than bolted-on. This is one of the three key strategic criteria we see for forward-looking enterprises that are accelerating the security of their applications. Make applications secure by design – zero-trust is now […]

Leave a Comment

Home and small business routers under attack – how to see if you are at risk

Evan Grant, a researcher at network security scanning company Tenable, recently decided to have a go at hacking a home router. The idea, it seems, was more to learn about the general techniques, tools and procedures available to router hackers than to conduct a security assessment of any particular product. Understandably, therefore, Grant picked a router model […]

Leave a Comment

Possible attacks on the TCP/IP protocol stack and countermeasures

The task of a computer security system is to safeguard the information transmitted over the network and to adequately preserve the data stored in it.  Excluding in this discussion threats due to natural disasters, we can classify the man-made risk, to which an information system is subject, into intentional threats or unintentional threats due to negligence […]

Leave a Comment

Hospital Operator Takes Network Offline After Major Cyberattack

A Californian hospital operator has made the move to take is network offline after it was hit by a major cyberattack.  Reports state that the Scripps Health computer network that operates across half a dozen hospitals and a number of outpatient facilities in the San Diego, California area was forced to move to offline procedures […]

Leave a Comment

5G network slicing vulnerability leaves enterprises exposed to cyberattacks

security in 5G networks

Leave a Comment

Developing a Strong Security Posture in the Era of Remote Work

Leave a Comment

Nmap Cheat Sheet

Nmap Cheat Sheet – Infographic by SANS Institute

Leave a Comment

How do I select a network monitoring solution for my business?

Network monitoring is essential for any organization with a network. Requirements may vary, but in general any IT team is going to need a single, comprehensive solution that shows the entire network in context and makes diagnosing network issues fast and easy. An effective solution should be able to discover every device connected to the […]

Leave a Comment