Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Read more about the article The Importance of Data (Part II)

The Importance of Data (Part II)

  • Post author:Dot Nerk
  • Post last modified:July 4, 2015
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:June 23, 2015

In a previous post entitled "The Importance of Data (Part I)" we have shown several charts built using the data collected from Hackmageddon. Inside…

Continue ReadingThe Importance of Data (Part II)
Read more about the article The Importance of Data (Part I)

The Importance of Data (Part I)

  • Post author:Dot Nerk
  • Post last modified:July 1, 2015
  • Post category:Cyber Attacks Statistics/Security
  • Post comments:1 Comment
  • Reading time:4 mins read
  • Post published:June 18, 2015

In information security, raw data is an important piece of information to understand the threat landscape, however it must be opportunely correlated to…

Continue ReadingThe Importance of Data (Part I)

TCP Split Handshake Attack Explained

  • Post author:Dot Nerk
  • Post last modified:October 1, 2018
  • Post category:Security
  • Post comments:9 Comments
  • Reading time:8 mins read
  • Post published:April 17, 2011

Update May 12: TCP Split Handshake: Why Cisco ASA is not susceptible Update May 11: The Never Ending Story Update April…

Continue ReadingTCP Split Handshake Attack Explained
Copyright 2022 - HACKMAGEDDON.COM