Entries by AR INTELL

Social Engineering Attack – Social Engineering Investigation

What is a social engineering attack? This is the use of deceptive tools and methods on you the human mind in order to manipulate you into divulging confidential or personal information. Once obtained this data will be used for fraudulent purposes. Especially today social engineers attack users with online accounts via chatting and email or […]

Hacker Detection – Spot the Hackers

Hackers & Cyber Criminals Not all hackers are cybercriminals. So how do you know if there are any hackers present in your company/organization its network and digital assets or cloud systems? How do you get a clear idea of what they are doing there, why and to what end? A presence could be either physical […]

Cyber Kill Chain Investigation & Assessment

What is a typical cyber kill chain? The concept “cyber kill chain” refers to the structure, process & methodology for intrusions into a computer network/system by means of a cyber attack. These are the typical phases: target identification – who is doing. what; when, where, and how? force dispatch to target – mission in motion/move into position […]

APT Groups – Advanced Persistent Threats

What are APT groups? APT – Advanced Persistent Threat groups are essentially covert or hidden hacker organizations that perform, “attacks on a country’s information assets, critical infrastructure or other elements of national security or strategic economic importance. Standard methods used to come down to cyber espionage, cyber warfare or cyber sabotage.” These groups are elusive, […]

Penetration Testing – Pentesting

Penetration testing (aka pen testing) is a highly specialized skill and set of methods whereby a red team specialist will run for example a simulation of a cyber attack on your computer system. This is how we find exploits and vulnerabilities before ‘real’ hackers do. Penetration testing is part of ethical hacking and is done to […]

Cyber Defense Investigations

What is Cyber Defense? Setting up a good cyber defense is about protecting your mission-critical assets. You have to be able to ensure business continuity after any type of cyber-attack and above all protect your data.

IT Security Audit

Why do you need an IT Security Audit? To know if your IT infrastructure is secure, you need to perform a professional IT security audit. Which IT security controls do you have in place? Do you have a clear view and understanding of the security of your network Which computer systems are in use? What […]