Remove Architecture Remove Engineering Remove IoT Remove Social Engineering
article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Social Engineering: Investigate the human element of cybersecurity by exploring social engineering techniques and tactics used to manipulate individuals. Internet of Things (IoT) Security: Examine the security risks associated with IoT devices, including privacy concerns, data integrity, and device authentication.

article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

This will not only help better test the architectures that need to be prioritized, but it will provide all sides with a clear understanding of what is being tested and how it will be tested. Social engineering tests Social engineering is a technique used by cyber criminals to trick users into giving away credentials or sensitive information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exploring Cybersecurity Research Topics for Master’s Degree Studies

CyberSecurity Insiders

IoT Security: Examine the vulnerabilities and challenges associated with securing the Internet of Things (IoT) devices and networks. Explore topics such as authentication protocols, encryption mechanisms, and anomaly detection techniques to enhance the security and privacy of IoT ecosystems.

article thumbnail

Emerging Trends in Cybersecurity: Strategies to Combat Cyber Extortion Attacks on Businesses in 2023

Cytelligence

Here are some key strategies that companies should consider: Strengthening Endpoint Security: Endpoint devices, including laptops, smartphones, and IoT devices, are often the entry points for cybercriminals. Zero Trust Architecture (ZTA) is gaining popularity as an effective security framework.

article thumbnail

Securing the Supply Chain During Shipping Challenges

CyberSecurity Insiders

Implement Zero-Trust Architecture. Verifying machine identities before enabling access can help secure Internet of Things (IoT) networks, which would otherwise expand supply chains’ attack surfaces. Distracted workers are particularly vulnerable to social engineering attacks, but thorough training can mitigate these risks.

article thumbnail

Uncommon infection methods—part 2

SecureList

RapperBot: “intelligent brute forcing” RapperBot, based on Mirai (but with a different C2 command protocol), is a worm infecting IoT devices with the ultimate goal to launch DDoS attacks against non-HTTP targets. RapperBot then determines the processor architecture and infects the device.

Malware 98
article thumbnail

SHARED INTEL Q&A: My thoughts and opinions about cyber threats — as discussed with OneRep

The Last Watchdog

Kapczynski Erin: Could you share your thoughts on the role of artificial intelligence, machine learning and the growth of IoT devices in both cyber defense and cyberattacks? Erin: What are some of the most common social engineering tactics that cybercriminals use? Erin: What role does human error play in cybersecurity incidents?