Hit enter to search
Just as in traditional wars, where clashes range from minor disagreements, skirmishes to a full blown battle, in the digital world too, the scale of cyber war can vary depending on the target and severity.
Warfare has undergone a paradigm shift from Stone Age to Digital Age – “Digital Warfare”. Just imagine that the Stone Age had knocked the door of the Earth 2.5 million years before 10,000BC!!
"Hey, my system has crashed!" There would be instant consternation. "Is my data safe?""Oh my GOD! My folders, files may be encrypted!"
In this rapidly changing world powered by IT, finding network solutions to secure your data and infrastructure can be both challenging and exciting.
SOAR (Secure Orchestration, Automation and Response) is an integral part of the SOC. It works in partnership with SIEM (Security Information and Event Management).
The primary objective of any organization’s security team is to reduce the risks involved in their processes. ISO-31000 standard defines risk as “the effect of uncertainty on the possibility of achieving the organization’s
Ransomware defined: Ransomware is a type of malware that encrypts the victims files. The hacker then demands a ransom to return or restore access to the stolen data for a price.
SIEM (Security Information and Event Management) collects data logs, security alerts and events and places it in a centralized server.
With the entire world becoming more technology driven, a lot of data and information is being stored online.
The Secure Optimization Center (SOC) is primarily responsible for anticipating and minimizing the attacks on the organization’s cyber network.
Anti virus software programs have been largely successful in detecting malware until now, as the anti virus solutions largely depended on signature-based detection and prevention.
The purpose of Deception Technology is to avoid any serious harm being caused by a cybercriminal who has managed to penetrate a network.
In Sun Tzu's inimitable Art of War, he observes,"All warfare is based on deception.
A Security Solution Architecture involves a lot of tools Like – SIEM, SOAR, MDR and other security tools working in conjunction to achieve the bigger
Use Cases help an organization to more efficiently identify and manage common reiterative events and function, as well to identify a particular situation
I.T revolution has brought significant changes in banking sector, be it online transactions, fund transfers, mobile wallets, electronic clearing services are some of
The Security Optimization Center has the right balance of security expert & professionals who are committed 24/7 to maintain your organization’s security
About the methodology or the procedure to test for misconfigurations in the target client’s AWS S3 buckets
AWS Security Best Practices to reduce Risks
BFSI has emerged as the most important industry vertical to be using big data and Important financial information as core banking market now encompasses
Blockchain has taken the cashless transaction mechanics by a storm and has a big potential to revolutionize the IT and financial sector in a powerful way.
Application Security has come over a long way from its origins to where it is now. The evolution of Application security and its history can be dated back to at least 1980s.
In recent years, the one industry that is quite on the bloom leveraging the technological advances coming through its industry is the healthcare sector.
Identity management defines the authenticity, accessibility and identifying individual user or group of users by associating rights and restrictions with the specific identity.
Most of the IT companies nowadays opt and work in an AGILE Environment, where the development process changes according to dynamic changes felt in the needs and
Predictive analysis is done by gathering and reviewing the available historical information, machine learning, & computing to predict what is the likelihood
For many organizations finding vulnerabilities in their security architecture can be a little difficult by itself and relying on internal audits
Travel & Tourism is one of those industries which has positioned itself on the digital domain on account of the widespread digitalization going around the world.
Cloud security is the top priority for IT professionals in 2019, according to a survey from NetEnrich.
Coming just months after the world found out that hackers can gain access to a user’s phone through a simple phone call.
Jarvis will be offered to automakers as a pay-as-you-go, cloud-based service. Once an automaker signs up, Jarvis can scan any piece of software that may go into a new car to detect possible vulnerabilities.
Stack is an acronym for three open source projects: Elasticsearch, Logstash, and Kibana. Together, they form a log management platform.
It was a bit tricky box given that it was categorized into the easy level. Getting the user flag was pretty straightforward but
It was actually a fairly easy box and was based on the Linux machine. Getting the root flag was much easier compared to the user flag.
It was actually a fairly easy box and was based on windows machine. Getting the user flag was damn easy and the root flag wasn’t that difficult as well
It was actually a fun box and the level of the box was stated as easy. Getting the user flag was tougher than getting the root flag
LibSSH is a C library that enables you to write a program that uses the SSH protocol. With it, you can remotely execute programs
Apache Struts is a very popular open source web application framework that is used to develop Java-based web applications
EternalBlue is nothing but an exploit that was actually developed and used by the National Security Agency (NSA)
According to the internet, Cross-Site Scripting (XSS) attacks are a type of injection
Ever thought of starting your career in the security field??
Mirai Botnet came into light in October 2016 when it was responsible for a DDOS attack that took down many large website
This article is about the XSS vulnerabilities that I had found out on Monstra CMS 3.0.4.
In this article we will be understanding the arp spoof attack which is basically a type of man in the middle attack
In this article we will see how to carry out an arp spoof attack which will lead to sniffing packets along with stealing
In our modern world where mostly everything is networked in some way or the other, security has become a major worldwide
Do you know travel and transportation industry is the 2nd most targeted industry for cyber-attacks in the year 2018
Cybersecurity now requires a more holistic approach with you having to ascertain and manage the Software, Hardware & Human element.
Today we will go through the walkthrough of the machine Heist which retired very recently.
We will go through the walkthrough of machine Networked which retired very recently.
A recent research paper was released which predicted that - “The Largest Cyberattack in History Will Happen Within Six Months”.
The current game of hide-n-seek between the attackers and defenders in cybersecurity is unfair.