Skip to content
DannyDodds.com
Cyber Security Enthusiast
  • Home
  • Blog
  • Tutorials
  • Projects

Tag: Security

Getting into Information Security.

1 February 2021 Danny Leave a comment

Note: this is consistently being updated and changed as much as I can, I may have gotten some thing wrong,…

Continue Reading →

Posted in: Blogging, Personal Security Filed under: getting, information, information security, infosec, into, Security, SOC, twitter

Maze Ransomware

25 January 2021 Danny Leave a comment

In late 2019 and early 2020 Maze Ransomware started its surge in attacks, but what is Maze ransomware, and how…

Continue Reading →

Posted in: Hacking Filed under: crime, cybercrime, encryption, malware, maze, ransomware, Security, victim

Types of Attacks

27 August 2020 Danny Leave a comment

• Social engineering Phishing Phishing is a method that attackers use in which they will send emails to a user,…

Continue Reading →

Posted in: Hacking Filed under: attack vectors, attacks, dumpster diving, hoax, impersonation, phishing, Security, security+, shoulder surfing, spear phishing, spear-phishing, tailgating, vishing, watering hole attack, whaling

Types of Malware

Danny Leave a comment

Viruses Viruses are a specific piece of malware which replicates itself to further infect other devices, file systems and shares.…

Continue Reading →

Posted in: Non classé Filed under: adware, backdoor, backdoors, bot, bots, crypto, crypto-malware, cryptomalware, definitions, keylogger, logic bomb, malware, ransomware, RAT, RATs, rootkit, Security, security+, spyware, trojan, virus, viruses, worm, worms

OWASP Top 10: Number 09

10 June 2020 Danny Leave a comment

Using Components with known vulnerabilities This one is a lot more specific to application or website development; using components with…

Continue Reading →

Posted in: OWASP Filed under: information security, infosec, number 9, OWASP, OWASP TOP 10, OWASP TOP TEN, Security, TOP 10, TOP TEN, Vulnerabilities, website security

OWASP Top 10: Number 10

Danny Leave a comment

Insufficient logging and monitoring According to the OWASP organisation, the average time it takes for a breach to be detected…

Continue Reading →

Posted in: OWASP Filed under: information security, infosec, Logging, monitor, Monitoring, OWASP, OWASP TOP 10, OWASP TOP TEN, Security, SIEM, TOP 10, TOP TEN, website security

Buy me a coffee

Recent Posts

  • Getting into Information Security.
  • Maze Ransomware
  • Principles (reasons for effectiveness)
  • Types of Attacks
  • Types of Malware

Recent Comments

    Archives

    • February 2021
    • January 2021
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    Copyright © 2021 DannyDodds.com — Ascension WordPress theme by GoDaddy