Submit your search
2022-12-03
What is clickjacking attack?

A clickjacking attack is a type of web security exploit that involves tricking a user into clicking on a malicious link or button, typically by overlaying the malicious element on top of a legitimate element on a web page. This can be done by using transparent or opaque layers to hide the true nature of […]

Read More
2022-12-02
Device Fingerprinting: Discover how exposed are you?

Definition Device fingerprinting is the process of analyzing a device’s unique attributes to identify it. This approach intends to track individuals reliably and collect individualized identification information. Cookies are the most common method of tracking users. While they’re practical and users likely have some familiarity with them, they raise concerns for privacy-conscious users who disable […]

Read More
2022-11-30
Protecting data in AWS S3: A step-by-step guide to secure your buckets.

AWS is the top cloud provider worldwide, offering clients the same infrastructure Amazon uses for its e-commerce. S3, part of the AWS suite, is an object storage service for storing files, music, videos and more as objects. However, S3 data breaches are not uncommon, such as the US voter records leak from a misconfigured S3 […]

Read More
2022-11-27
Shamir's Secret Sharing Scheme

Shamir's Secret Sharing (SSS) is an efficient secret sharing algorithm for distributing private information (the "secret") in such a way that no individual holds intelligible information about the secret. To achieve this, the secret is converted into parts (the "shares") from which the secret can be reassembled when a sufficient number of shares are combined […]

Read More
2022-11-26
How to Install and Configure OSSEC on Ubuntu Linux

OSSEC is an open source host-based intrusion detection system that can be used to keep track of servers activity. It supports most operating systems such as Linux, FreeBSD, OpenBSD, Windows, Solaris and much more. It is used to monitor one server or multiple servers in server/agent mode and give you a real-time view into what’s […]

Read More
2022-11-16
The quieter you become, the more you are able to hear - part 1

Intro In the last few months, we've detected an increase of new strategies used by malicious attackers. Unfortunately, they were successful in draining a lot of crypto wallets - stealing more than $1 million worth in different cryptocurrencies. After we realized that multiple victims were unable to recognize new attack methods as malicious, we've begun […]

Read More
1 6 7 8 9 10 18

Ready for Action?

Don’t hesitate to contact us if you need more information.
Let's Go!
ALVOSEC
BTC: bc1qnn4zfqqtexl4fkjk2vz6tk74sn92x326wwn0ph

linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram