NI logo
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

Cyber Security

Digital Personal Data Protection Bill 2022 | Network Intelligence

January 9, 2023 Krithika Subramani 0

On November 30, 2022, I attended the DSCI conference in the bustling city of Mumbai, India. The conference was held to gather input from leading industry representatives on the recently [more]

cybersecurity-career-guidance

Cybersecurity Career Guidance — Part 2 — the Intermediate Level

October 10, 2022 K K Mookhey 0

In Part 1 of this series, I wrote about how a beginner might want to approach the field of cybersecurity, and the knowledge and skills they should seek to acquire. In this [more]

The Supply Chain Cybersecurity Saga: Challenges and Solutions

February 28, 2022 Shalaka Patil 0

According to a study by Argon Security, software supply chain attacks grew by more than 300% in 2021 compared to 2020. The study also indicated that attackers focus most heavily on open-source [more]

Secure your family and friends from online Grinch’s stalking and bullying!

December 14, 2021 Network Intelligence 0

Did you know that Jingle Bells was the first song played in outer space by the crew of NASA’s Gemini 6A space flight in 1965? Picture, if you will, a group of [more]

Cyber-security-of-health-care-devices-India

Security of Health Care Devices

December 20, 2019 Anuraag B 0

Healthcare Cybersecurity Introduction Did you know? It is established that 1 out of every 4 medical devices is now connected. If we are to go to the hospital today, you [more]

Malware development – Welcome to the Dark Side: Part 3

March 10, 2018 Chetan Nayak 3

In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and parse commands sent via netcat listener. However, netcat is not [more]

Malware development – Welcome to the Dark Side: Part 2-2

March 6, 2018 Chetan Nayak 5

  In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about writing a client-side socket using Windows API. In this blog, [more]

Posts navigation

1 2 »

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 132 other subscribers

Top Posts

  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
    SAP Security Assessment Methodology Part 1 - A Penetration Tester Meets SAP
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
    SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
    The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • SSL Pinning: Introduction & Bypass for Android
    SSL Pinning: Introduction & Bypass for Android
  • The weaponisation of information
    The weaponisation of information
  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?
  • Look who’s watching
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Categories

  • Android Forensics
  • Anti-Forensics
  • Assessment
  • Case Studies
  • Compliance
  • Compromise Detection
  • Cyber security career
  • Data Privacy
  • Database Monitoring
  • DFIR
  • Digital Forensics
  • Disk Forensics
  • Fundamentals
  • Hacks
  • Incident Response
  • Interview
  • Laws & Regulations
  • Malware Analysis
  • Mobile
  • Network Forensics
  • Opinion
  • Penetration Testing
  • Phishing
  • Reading
  • Red Team
  • Research
  • Secure Coding
  • Security Measures
  • Security Review
  • Security Testing
  • SOC
  • Social Engineering
  • Sql Injection
  • Survey
  • Telecom Security
  • Threat Advisory
  • Tools
  • Uncategorized
  • Web Application Security
  • Wireless Security

Recent Posts

  • Digital Personal Data Protection Bill 2022 | Network Intelligence
  • Cybersecurity Career Guidance — Part 2 — the Intermediate Level
  • Cybersecurity Career Guidance – Part 1 – the Beginner’s Journey
  • The weaponisation of information
  • In a commoditised world, where is individual privacy?

Recent Comments

  • Pankaj Lad on Business Impact Analysis – Getting it Right
  • gmd on Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)

Copyright © 2023 | WordPress Theme by MH Themes