NI logo
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Articles by Nandeesha B

Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products

February 16, 2022 Nandeesha B 0

Severity: Critical INTRODUCTION Adobe has addressed critical Magento Zero-Day Vulnerability (CVE-2022-24086) that is under active exploitation by threat actors. The security flaw impacts Adobe Commerce and Magento Open Source products. [more]

No Image

Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities

February 11, 2022 Nandeesha B 0

Severity: High Initial Access Broker (IAB) group Prophet Spider and an unknown threat group are actively attempting to exploit the Log4j vulnerability in VMware Horizon. Attack Chain:• In ongoing threat [more]

No Image

Threat actors are targeting critical organizations using destructive malware – “WhisperGate”

February 3, 2022 Nandeesha B 0

The threat campaign is referred to as Operation Bleeding Bear. The attacks are currently limited to Ukrainian government agencies and businesses; however, the attack seems to have evolved and sophisticated [more]

No Image

Zero-day vulnerability (aka Log4Shell) in Apache Log4j is being actively exploited

December 13, 2021 Nandeesha B 0

INTRODUCTION Log4Shell vulnerability (CVE-2021-44228) impacts multiple versions of awidely distributed Java software component, Apache Log4j 2. The vulnerability exists in the way the Java Naming and Directory Interface (JNDI) feature [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 135 other subscribers

Top Posts

  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • Volume Boot Sector Format of FAT
    Volume Boot Sector Format of FAT
  • Look who’s watching
    Look who’s watching
  • Android Forensics: How To Bypass The Android Phone Pattern Lock
    Android Forensics: How To Bypass The Android Phone Pattern Lock
  • 5 Cybersecurity lessons to learn from Stranger Things 
    5 Cybersecurity lessons to learn from Stranger Things 
  • Cybersecurity Career Guidance - Part 1 - the Beginner’s Journey
    Cybersecurity Career Guidance - Part 1 - the Beginner’s Journey
  • The weaponisation of information
    The weaponisation of information
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
    The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?
  • Look who’s watching
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Categories

  • Android Forensics
  • Anti-Forensics
  • Assessment
  • Case Studies
  • Compliance
  • Compromise Detection
  • Cyber security career
  • Data Privacy
  • Database Monitoring
  • DFIR
  • Digital Forensics
  • Disk Forensics
  • Fundamentals
  • Hacks
  • Incident Response
  • Interview
  • Laws & Regulations
  • Malware Analysis
  • Mobile
  • Network Forensics
  • Opinion
  • Penetration Testing
  • Phishing
  • Reading
  • Red Team
  • Research
  • Secure Coding
  • Security Measures
  • Security Review
  • Security Testing
  • SOC
  • Social Engineering
  • Sql Injection
  • Survey
  • Telecom Security
  • Threat Advisory
  • Tools
  • Uncategorized
  • Web Application Security
  • Wireless Security

Recent Posts

  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?

Recent Comments

  • Pankaj Lad on Business Impact Analysis – Getting it Right
  • gmd on Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)

Copyright © 2023 | WordPress Theme by MH Themes