TTP stands for tactics, techniques, and procedures when referring to cyber security. The specific Strategies and methods that the cyber attackers and criminals use to explain the systems or networks of others by attacking their vulnerabilities. There is a huge range of techniques used by attackers to carry out ransomware attacks, Malware attacks, or maybe…
Category: Cyber Security
What is spooling in cyber security?- Dummy’s guide to understanding it.
Overview: Simultaneous peripheral operations online, or as we know it in short, SPOOL, is a term used in computer and networking systems. It is normally used for describing the temporary process of saving data and processing it in bulk at some other time. It can be called a buffer mechanism that is meant for storing…
Are you being spied on at your workplace?
You might have come across the word corporate espionage. The word seems very fancy but might not be as dramatic and physically threatening as it sounds. The word espionage brings in a lot of hypothetical thoughts, the likes seen in spy movies, but this would break your bubble that it is nothing as glamorous as…