Honghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Introduction With the increasing number of threats to network security, it is critical to understand and prevent possible attacks. Blast-RADIUS is a security vulnerability that severely affects the RADIUS protocol, allowing attackers to bypass authentication and gain unauthorized access. This article...

Continue ReadingHonghong Shares丨Identify and Prevent Security Risks of Blast-RADIUS Vulnerability with ProfiShark and IOTA

Honghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

IT Networks (Traditional Networks) IT networks are the backbone of modern computing, providing the infrastructure for data exchange, communication and processing. Typical applications include: Office Networks Data Centers Cloud Services Internet Connectivity These networks rely on standard protocols such as TCP/IP, DNS and HTTP...

Continue ReadingHonghong Sharing | IT and OT Networks: Structure, Challenges and the Future of Precision Analysis

Hong Hong Dry Goods | Network Forensic Analysis and Intrusion Analysis Training is coming, let's have a serious preview first! What is IOC and how to recognize and respond to it?

文章速覽: ● 網路安全中的IOC是什麼?● IOC和IOA有什麼區別?● IOC有哪些類型?● IOC的常見實例有哪些?● IOC解決方案和工具 近期,Wireshark 大學和宏虹Allegro …

Continue ReadingHong Hong Dry Goods | Network Forensic Analysis and Intrusion Analysis Training is coming, let's have a serious preview first! What is IOC and how to recognize and respond to it?

Honghong Shares] Using ProfiShark to Build a Portable Network Forensics Toolkit

網路安全領域日益重視便攜式取證工具的靈活應用。本文介紹瞭如何構建一個以ProfiShark 1G為核心的便攜式網路取證工具包,以提高網路取證的效率和實效性。文章速覽:● 為什麼要使用便攜式網路取證工具…

Continue ReadingHonghong Shares] Using ProfiShark to Build a Portable Network Forensics Toolkit

How to deal with hackers' various network intrusion methods

在數位化時代,網路安全成為了一個日益嚴峻的挑戰。組織不僅需要意識到潛在的網路威脅,還需採取有效措施來預防和應對這些威脅。隨著網路攻擊手段的不斷演進,如何有效保護組織的網路安全、防範潛在的數據洩露,成為…

Continue ReadingHow to deal with hackers' various network intrusion methods