Breaking Kenya News Forum

Topics

Reconnaissance Attack

Reconnaissance is commonly used by cyberattackers to identify an opening any weakness that will allow them to bypass an organization’s security controls to access and exfiltrate data, hold assets hostage for ransom or even sabotage systems. During reconnaissance, adversaries avoid activities that will trigger security alarms. Most organizations rely on reactive attack detection and response tools, they are often unable to identify reconnaissance activity. How do we avoid adverse effects of Reconnaissance

Previous Article

Leave a Reply

Your email address will not be published. Required fields are marked *.

You may use these <abbr title="HyperText Markup Language">HTML</abbr> tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>