Network Intelligence India – Threat Advisory (8 Feb, 2016)

From Our Blog:

  • Data Privacy – An Introduction by Latha Sunderkrishnan (Senior Consultant)
    When companies and merchants use data or information that is provided or entrusted to them, this data should be used according to the agreed purposes.  Companies must ensure data privacy because the information is an asset to the company.
    Privacy concerns exist wherever personally identifiable information or other sensitive information is collected and stored – in digital form or otherwise. Improper or non-existent disclosure control can be the root cause for privacy issues. Data privacy issues can arise in response to information from a wide range of sources…read more
  • Windows Kernel Exploitation by Neelu Tripathy (SME)
    A plethora of attacks have illustrated that attacker specific code execution is possible through user mode applications/software.  Hence, lot of protection mechanisms are being put into place to prevent and detect such attacks in the operating system either through randomization, execution prevention, enhanced memory protection, etc. for user mode applications.
    However little work has been done on the Kernel end to save the base OS from exploitation. In this article we will discuss the various exploit techniques and methods that abuse Kernel architecture and assumptions…read more

________________________________________________________________________________________________________

Vendor Patches:

Security Breaches:

Malware News:

Security News:

  •  
  •  
  •  
  •  
  •  
  •  
  •