NI logo
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Articles by Shalaka Patil

5 Cybersecurity lessons to learn from Stranger Things

5 Cybersecurity lessons to learn from Stranger Things 

May 27, 2022 Shalaka Patil 0

Netflix’s original series ‘Stranger Things‘ season-4 is on its way to a worldwide release today. As the plot deepens every season, viewers are rooting hard for their favourite characters. From [more]

The Supply Chain Cybersecurity Saga: Challenges and Solutions

February 28, 2022 Shalaka Patil 0

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers focus most heavily on open-source [more]

Breaking up on Valentine’s Day!

February 11, 2022 Shalaka Patil 0

Valentine’s Day is approaching fast. And on this day, if anyone is more active than lovers around the world, it is the cybercriminals.  Cybercriminals always look for opportunities to take [more]

7 Steps To Protect Your Digital Privacy In This Holiday Season!

December 17, 2021 Shalaka Patil 0

Holidays are just around the corner. And with the current hybrid workspace norms, many employees choose to work remotely to enjoy longer stays with their families.  While this sounds amazing, [more]

Confession Of A Shopaholic That Will Help You Shop Safer!

December 15, 2021 Shalaka Patil 0

Shopping during Christmas is always fun and exciting, but it can get tricky with offers that sound too good to be true. This blog will give you tips to help [more]

The Ominous signs of a potential Inter-State Cyberwar

August 16, 2021 Shalaka Patil 0

According to an announcement made on Tuesday, August 10 by FireEye, a global cybersecurity firm, a coordinated cyberattack, which most likely originated in China, hit dozens of Israeli government and [more]

Cybersecurity Threats at the Olympics

August 6, 2021 Shalaka Patil 0

With more than 11,000 athletes from 206 countries participating, the world is watching the delayed Tokyo 2020 Olympic Games with great enthusiasm. But, unfortunately, while the Olympics showcases the very [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 129 other subscribers

Top Posts

  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • SSL Pinning: Introduction & Bypass for Android
    SSL Pinning: Introduction & Bypass for Android
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Cross-Origin Resource Sharing (CORS)
    Cross-Origin Resource Sharing (CORS)
  • SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
    SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
  • Malware Development – Welcome to the Dark Side: Part 2-1
    Malware Development – Welcome to the Dark Side: Part 2-1
  • Password-less Remote Desktop Protocol (RDP) Session Hijacking
    Password-less Remote Desktop Protocol (RDP) Session Hijacking
  • Active Subdomain Enumeration (Part 2)
    Active Subdomain Enumeration (Part 2)
  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?
  • Look who’s watching
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Categories

  • Android Forensics
  • Anti-Forensics
  • Assessment
  • Case Studies
  • Compliance
  • Compromise Detection
  • Cyber security career
  • Data Privacy
  • Database Monitoring
  • DFIR
  • Digital Forensics
  • Disk Forensics
  • Fundamentals
  • Hacks
  • Incident Response
  • Interview
  • Laws & Regulations
  • Malware Analysis
  • Mobile
  • Network Forensics
  • Opinion
  • Penetration Testing
  • Phishing
  • Reading
  • Red Team
  • Research
  • Secure Coding
  • Security Measures
  • Security Review
  • Security Testing
  • SOC
  • Social Engineering
  • Sql Injection
  • Survey
  • Telecom Security
  • Threat Advisory
  • Tools
  • Uncategorized
  • Web Application Security
  • Wireless Security

Recent Posts

  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?

Recent Comments

  • Pankaj Lad on Business Impact Analysis – Getting it Right
  • gmd on Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)

Copyright © 2023 | WordPress Theme by MH Themes