Tag: Network security

Check all articles
Video
Webinar: Achieve faster incident response with Sycope’s NDR capabilities
See how you can achieve faster incident response in the Sycope system – a live demo conducted by our expert, Piotr Kałuża.
Watch >
Blog
IDOR vulnerability – how to detect an attack on web applications through HTTP traffic analysis
The IDOR vulnerability (Insecure Direct Object References) is one of the most common weaknesses in web application security. In this article, we explain how to detect an active IDOR attack by analyzing unusual patterns in HTTP traffic analysis and how network monitoring supports effective API protection.
Paweł Drzewiecki
28/11/2025
Read more >
Blog
Zero Trust architecture – the role of network visibility and microsegmentation in security
Zero Trust architecture is based on the principle “never trust, always verify.” The foundation of its implementation is one hundred percent network visibility, which enables the verification of every connection and effective microsegmentation. We explain how to start building a mature security architecture.
Paweł Drzewiecki
21/11/2025
Read more >
Blog
ARP spoofing – how to detect a Man-in-the-Middle attack and ARP poisoning in a LAN network
ARP spoofing is one of the most dangerous internal attacks, leading to full control over network traffic. In this article, we explain how ARP poisoning works and how network traffic analysis enables real-time detection of a Man-in-the-Middle attack, ensuring essential LAN security.
Paweł Drzewiecki
14/11/2025
Read more >
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.