In the previous blog, we covered the basics, what threat hunting is, why it matters and the key frameworks behind it, With that foundation in place, you’re ready to go deeper
Cyber threats don’t always knock on the front door or announce themselves. Some stay hidden, quiet, patient, and dangerous. And while cybersecurity continues to improve at blocking threats, adversaries are evolving just as quickly
Drowning in security alerts? You’re not alone. Every day, SOC analysts face an overwhelming flood of notifications, many of them false alarms. The result? Alert fatigue. Critical threats get buried, response times slow down, and teams burn out.
First to understand postMessage xss attack you need to understand this two things :
In the previous blog, we covered the Preparation and Detection & Analysis phases of the Incident Response process, breaking down each step to understand its purpose and essential components. In this second part, we are going to explore the Containment, Eradication & Recovery, and Post-Incident Activity phases.
You've just observed something unusual: a sudden spike in outbound connections to suspicious domains known for hosting malwares. Concurrently, employees report sluggish system performance and strange pop-up messages on their screens. Additionally, multiple employees report receiving phishing emails with suspicious attachments.
In the previous blog, we focused mainly on creating a solid SOC plan, getting ready to succeed. Now that the plan is in place, it’s time to move on to implementation. This phase involves selecting the right technologies to run the SOC, building a competent and consistent team through recruitment and training,...
In today’s digital era, cyber threats are more sophisticated and prevalent than ever. Organizations need robust defenses to protect their sensitive data and systems, making a Security Operations Center (SOC) essential. A SOC serves as the heart of cybersecurity operations, monitoring and responding to threats in real-time.
L’autorité nationale de protection des données à caractère personnel (ANPDP) en Algérie est un organisme administratif indépendant créé pour garantir la protection des données personnelles...
La loi algérienne 18-07 consacre des droits fondamentaux aux individus (ou les personnes concernées) pour leur permettre de reprendre le contrôle sur leurs informations personnelles.
Dans le paysage complexe de la protection des données personnelles, deux rôles clés se démarquent de par le monde, à savoir : le délégué à la protection des données (DPD ou DPO) et le responsable de traitement (RT). Ils jouent des rôles distincts, mais complémentaires dans la gestion des données personnelles au sein d’une organisation.
Le traitement des données à caractère personnel sous la loi 18-07, qu'il soit automatisé ou non, repose sur plusieurs principes essentiels visant à garantir la sécurité, la transparence et le respect de la vie privée des individus.
Au fur et à mesure que les organisations collectent, traitent et stockent des informations personnelles, elles prennent la responsabilité de protéger ces données contre les risques ainsi que des violations qui peuvent se produire dans des organisations de toutes tailles et de tous secteurs.
Dans le paysage numérique actuel, les entreprises collectent et stockent de grandes quantités d'informations, qu'il s'agisse de profils de clients, d'enregistrements de transactions, de données d'employés ou de secrets de fabrication.
At OCTODET, the protection of our data, as well as that of our clients and customers, is a key priority. Our resources are strictly restricted to vetted personnel who have been screened through our onboarding process.
If you ask me how I picture the cybersecurity landscape, I would say it is like a maze with constantly evolving paths, twists, tunnels and holes that malicious actors try to find and use in order to infiltrate areas they are not permitted...
In the previous blog, we introduced the MITRE ATT&CK framework with its components, and we discussed how it could be leveraged efficiently to detect threats. Expanding from that, we are going, in this second part, to explore the other usages...
In the hidden corners of the internet lies a shadowy world known as the dark web, where anonymity reigns and cybercriminals thrive, spawning increasingly sophisticated threats in an invisible war against digital malevolence.
L'importance de la protection des données à caractère personnel est devenue cruciale dans notre société de plus en plus connectée. Les progrès technologiques ont permis aux entreprises de collecter et d'utiliser...
In an era of unprecedented data growth and according to The State of Attack Surface Management 2022 Report, a staggering 80% of cybersecurity professionals find themselves inundated by the sheer volume of security alerts.