Author: Fortify Security Team

IP Subnet Sheet

Have you ever wondered what is a /27?  Or how many IP addresses do I get to use with a /28?  Is there a use for a /31?  CIDR Subnet Mask Total IPs Usable IPs /32 1 1 /31 2 0* /30 4...

Read More

What is Fileless Malware

Fileless, Malwareless, In-Memory Malware, Hidden Malware… regardless of what names these attacks are given by the press, they all share the same attack characteristics. These attacks do not write files to disk, but rather, they...

Read More