Preventing Data Breaches: How MSSPs Can Protect Your Business?
As businesses increasingly rely on digital infrastructure, the specter of data breaches looms larger than ever. According to IBM’s report, the average cost of a […]
As businesses increasingly rely on digital infrastructure, the specter of data breaches looms larger than ever. According to IBM’s report, the average cost of a […]
One of the most critical factors that determine the success and efficacy of a digital forensic investigation is putting together the right temporal analysis of […]
Introduction With each passing day, the world is waking up to new global cybersecurity challenges. The latest one was unearthed this month. Move over SolarWinds, […]
Note: This is a technical deep-dive into DearCry ransomware. If you want a preliminary analysis of the ransomware, you can find it here. The Network […]
Note: We have also done a technical analysis on DearCry. Read here. It’s a warm summer morning. While sipping your morning coffee, you access the […]
Data exfiltration is a common data theft technique and most feared cyber-attack. it is a data breach that happens when a company’s or an individual’s […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. Both sessions were great experiences […]
ELK Stack is a collection of three components – Elasticsearch, Logstash & Kibana Logstash – This component is responsible for processing incoming data. It […]
INTRODUCTION Point-of-sale (POS) is the place where a retail transaction is completed. It is the point at which a customer makes a payment to the […]
Introduction Android is an open source operating system based on the Linux kernel, initially developed by Android Inc., which Google bought in 2005. Initially, Android […]