Nordic Defender Capture the Flag Competition Chapter Two: Odin

Odin’s territory remained unconquered after one day The second round of the Nordic’s greatest Capture the Flag challenge started at 4 PM (CET) on the 20th of April. The competition named “Odin” consists of 6 easy, 8 medium, 6 hard challenges. By solving these 20 challenges, participants can collect a total of 2350 points. 1200 …

Nordic Defender Capture the Flag Competition Chapter Two: Odin Read More »

What is Vulnerability Disclosure Philosophy (VDP)?

What is Vulnerability Disclosure Philosophy (VDP)?

Any business launched online in the cyber network is inevitably at risk of vulnerabilities — bugs and issues that can endanger the business infrastructure as well as public information and create irreparable damage. Consequently, many organizations are now using vulnerability rewards programs (VRP) such as Bug Bounties in order to have a safer business online …

What is Vulnerability Disclosure Philosophy (VDP)? Read More »

Nordic defender Capture the Flag Chapter One: Tyr

Groundbreaking Records! Congratulations on the unprecedented record you set in our Challenge. We would like to thank all the teams and individuals for participating in the Nordic Defender Challenge Program and for the feedback they gave to help us improve the program. The challenge boasts the participation of 823 teams, 670 individuals from 128 countries …

Nordic defender Capture the Flag Chapter One: Tyr Read More »

Type of Computer forensics investigation

Goal and Purpose of Computer Forensics

“Computer forensics is one of the three main functions of computer security: the TRIAD consists of vulnerability assessment and risk management, network intrusion detection, and incident response computer investigations.” What is computer forensics? A computer forensic is a methodical series of techniques and procedures for gathering evidence from computing equipment and various storage devices and …

Goal and Purpose of Computer Forensics Read More »