Bringing you Under the hood FACTS From the Offensive Side

BHEH | FACTS

 Personal Collection for Offensive Security & Digital Forensics  Facts



Hacking has Evolved

Hacking has Evolved

   Reading Time: 3 Minutes     Hacking has evolved into helping shape the Information Security Industry.   Back in the '90s, hackers were considered criminals, no one wanted to interact with them without understanding that a...

read more
You can’t protect what you can’t see

You can’t protect what you can’t see

  When it comes to advanced threat protection from a defensive perspective, you usually make sure to invest in various hardware and software solutions such as Intrusion Prevention Systems. Intrusion Detection System working proactively, analyzing the...

read more
Manual Pentesting is more Effective than the Automated

Manual Pentesting is more Effective than the Automated

No doubt that both methods, when it comes to performing Pentesting Infrastructure share the same purpose. There is also the need for compliance, in order to prove and make a point of how a company takes seriously their Privacy and Security. Human Vs...

read more
A Hacker needs only one loophole to hack any system.

A Hacker needs only one loophole to hack any system.

Unfortunately, most companies lack the capabilities to be able to detect a coordinated attack head-on. This means usually when someone performs an incident response to start mitigating, the attacker is already well-established into the network, has several...

read more
Not all hackers are criminals

Not all hackers are criminals

  The term ‘hacking’ generally has a negative philosophy as many people assume that all hackers are bad, and they treat them with suspicion in the belief they have criminal intentions.   To most people, though, the term ‘hacker’ is associated...

read more
Firewalls are no longer enough

Firewalls are no longer enough

Firewalls operate by checking incoming and outgoing traffic against a set of rules. These rules might be based on metadata (e.g. port number, IP address, Protocol Type, etc..) or real data, i.e. the payload of the packet. For example: * Drop all incoming...

read more
Your Data in the Cloud is not as secure as you think

Your Data in the Cloud is not as secure as you think

Many companies think they can leverage their existing security mechanisms in the Cloud, however, it is an entirely different aspect and must be looked from a different perspective with privacy in mind. Before migrating to a cloud, or starting a cloud...

read more
The Weakest Link in a Security Chain is the Human Element

The Weakest Link in a Security Chain is the Human Element

Advanced technology and security practices, no matter how sophisticated, will always be constrained by the human factor. No matter how strong your: • Firewalls • Intrusion Detection Systems • Cryptography • Anti-Virus Software And the list goes on, YOU...

read more
Two-Factor Authentication is not always Totally Secure

Two-Factor Authentication is not always Totally Secure

Two-factor authentication is an extra level of security known as multi-factor authentication. It adds an extra step to the login process. Instead of only having to enter your username and password to log into a website, with two-factor authentication...

read more
VPN: You may not be as secure as you think you are

VPN: You may not be as secure as you think you are

Premium ContentSubscribe to Patreon to watch this episode.Reading Time: 2 MinutesUsing a VPN is not 100% Secure. The reason is simple, still, security researchers, hackers, submit bug bounties, testing a lot of VPNs, by showing programming errors that...

read more
Fact: There is no minimum threat in     Cyber Security

Fact: There is no minimum threat in Cyber Security

It goes back to the root of the problem. In today's world, attacks will continue to happen, and exploits will continue to be found. A threat on the offensive side of Cyber Security, once found it cannot be categorised as a minimum. Today, behind such targeted attacks,...

read more
Fact: There is no Operating System that is 100% Secure

Fact: There is no Operating System that is 100% Secure

There is no operating system that is 100% secure, based on 2019 stats, Android, Windows, IOS, OSX were the top used operating systems. So when hackers work with payloads, also known as "Viruses, Worms etc..", they tend to create more available ways targeting the most...

read more

Facts do matter