In the security industry, we rarely tell a story from the victimโs perspective. Instead, we focus on a malicious actorโs perspective: their tactics, techniques, and procedures (TTPs). So, I decided to take a turn as a victim and see what happened after visiting a compromised website with malicious adtech.
The Voice of Cyberยฎ
Network Security
Network Security involves the implementation of measures to safeguard the integrity, confidentiality, and availability of data transmitted over networks. This encompasses a range of technologies and practices, including firewalls, intrusion detection and prevention systems, virtual private networks (VPNs), and secure network architecture.
Newest Release
Deep Dive Articles
Sort By
- Date
- Title

At the hustling and bustling Melbourne Convention and Exhibition Centre, the 2024 edition of Cisco Live commenced with discussions on the future of cybersecurity and data ...
Tom Casey Senior Vice President, Products & Technology at Splunk recently presented at Cisco Live in Melbourne about the critical intersection of digital resilience, ...
According to IDCโs recent Asia/Pacific Enterprise Connectivity and Telecom Services Survey, only 51% of ANZ companies believe their networks are equipped to handle the ...
Weโve reached a point where attackers can have the upper hand in many cases, which is why itโs paramount that the right tools are invested in to provide deep visibility into ...
Network monitoring is important in maintaining optimal IT infrastructure performance and security. Such software plays a role in monitoring various network parameters, ...
IP address spoofingย involves creating Internet Protocol (IP) packets with a fake source IP address. This is typically done with the intention of deceiving the recipient into ...
In The News
Sort By
- Date
- Title
The Victorian government has signed a 10-year, AUD $500 million (USD ~$330 million) contract with Motorola Solutions to maintain and enhance the Metropolitan Mobile Radio ...
New FortiGate G series next-gen firewalls empower customers to strengthen threat protection and future-proof IT infrastructureย
The building marks Fortinetโs first Innovation Hub in the Asia-Pacific, featuring a state-of-the-art data centre and a Technical Assistance Centre, along with a dedicated ...
Check Pointโs Infinity Platform offers the best protection against the latest generation of cyberattacks, with a block rate of 99.9% on new malware, 99.7% phishing prevention ...
Industry veteran with experience scaling notable network security brands joins world-class management team to accelerate momentum
Check Point Infinity XDR/XPR Delivers Unmatched Protection Against Ransomware and Endpoint Threats
Podcasts On Network Security