Checkmate
  • Home
  • NII Home
  • About Us
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Get Blog Updates

holidays

Holiday wishes from the CEO’s Desk!

December 25, 2021 K K Mookhey 0

The end of 2021 brought with it two high-impact events. One was the appearance of the Omicron variant that has led to a resurgence in the number of cases worldwide. [more]

Kickstart your holiday spirit with some cybersecurity binge watching!

December 21, 2021 Sujay Mendon 0

If you think about things that have nail-biting intrigue, edge-of-the-seat action, and high stakes drama, then cybersecurity has all of these and much more. No wonder so many films and [more]

Make it to Santa's ‘Nice’ Cybersecurity list!

Make it to Santa’s ‘Nice’ Cybersecurity list!

December 20, 2021 Altaf Halde 0

With Christmas around the corner, we all hope to make it to Santa’s ‘Nice’ List! The rules of the game are simple: be good year-round, and in return, Santa will [more]

7 Steps To Protect Your Digital Privacy In This Holiday Season!

December 17, 2021 Shalaka Patil 0

Holidays are just around the corner. And with the current hybrid workspace norms, many employees choose to work remotely to enjoy longer stays with their families.  While this sounds amazing, [more]

Confession Of A Shopaholic That Will Help You Shop Safer!

December 15, 2021 Shalaka Patil 0

Shopping during Christmas is always fun and exciting, but it can get tricky with offers that sound too good to be true. This blog will give you tips to help [more]

Secure your family and friends from online Grinch’s stalking and bullying!

December 14, 2021 Network Intelligence 0

Did you know that Jingle Bells was the first song played in outer space by the crew of NASA’s Gemini 6A space flight in 1965? Picture, if you will, a group of [more]

Follow Us

  • Twitter
  • LinkedIn
  • Instagram
  • Facebook

Search

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 124 other subscribers

Top Posts

  • Malware Development – Welcome to the Dark Side: Part 1
    Malware Development – Welcome to the Dark Side: Part 1
  • A Detailed Guide on OSCP Preparation - From Newbie to OSCP
    A Detailed Guide on OSCP Preparation - From Newbie to OSCP
  • Malware Development – Welcome to the Dark Side: Part 2-1
    Malware Development – Welcome to the Dark Side: Part 2-1
  • IT Act 2000 – Penalties, Offences With Case Studies
    IT Act 2000 – Penalties, Offences With Case Studies
  • SSL Pinning: Introduction & Bypass for Android
    SSL Pinning: Introduction & Bypass for Android
  • From SQL Injection To 0wnage Using SQLMap
    From SQL Injection To 0wnage Using SQLMap
  • Malware development – Welcome to the Dark Side: Part 4
    Malware development – Welcome to the Dark Side: Part 4
  • Malware development – Welcome to the Dark Side: Part 2-2
    Malware development – Welcome to the Dark Side: Part 2-2
  • Manipulating Host Headers - Not Anymore !
    Manipulating Host Headers - Not Anymore !
  • Bypassing Detection for a Reverse Meterpreter Shell
    Bypassing Detection for a Reverse Meterpreter Shell
  • National Information Assurance (NIA) Policy V2.0 –Qatar
  • 5 Cybersecurity lessons to learn from Stranger Things 
  • Consumer Protection Regulation
  • The Supply Chain Cybersecurity Saga: Challenges and Solutions
  • Attackers are actively exploiting a critical zero-day vulnerability in Adobe Commerce and Magento Open Source products
  • Breaking up on Valentine’s Day!
  • Threat actor groups are targeting VMware Horizon servers running versions affected by Log4Shell vulnerabilities
  • Threat actors are targeting critical organizations using destructive malware – “WhisperGate”
  • Holiday wishes from the CEO’s Desk!
  • Kickstart your holiday spirit with some cybersecurity binge watching!
Assessment C++ coding Cyber Security cybersecurity Elasticsearch ELK forensics FUD fully undetectable hacking holidays Kibana malware Malware Analysis malware development PCI DSS Penetration Testing pentesting Ransomware red team security trojan virus Vulnerability Assessments
  • Pankaj Lad: It would have been better if there were a small liner kind of definations used for these termologies.
  • gmd: Can you please update the blog? as the images are not accessible. Thankyou.
  • Anuraag B: You can check our online courses here.

Copyright © 2022 | WordPress Theme by MH Themes