Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

April 2022

Thoughts on diversity and inclusion in cybersecurity

Our other blogs and articles are primarily security-focused – this is non-technical yet relevant, one of the issues that I felt and intended to explore personally. It’s pretty hard to admit when you are in privilege, and it’s even harder to change the status quo when you are comfortable. This is a write-up on how I see diversity and inclusion currently in the cybersecurity industry, mainly a beginner’s understanding of the subject.

What is a watering hole attack?

The advance of the 21st century brought with it a significant shift in the work scene. Every industry and field relies heavily on computers and the digital world to function seamlessly. However, with it came the ever-mounting fear of cyber attack. Among the many forms of cyber attack is a watering hole attack, also known as a supply chain attack. In a watering hole attack, attackers mainly try to compromise a user by infecting the user’s computer and gaining access to the network.

What is Data Execution Prevention (DEP)?

Handling our system memory safely and protecting it from harmful programs and other programs that are prone to executable code run from a data page on different memory locations and specific data section is a challenging task. The essential Windows programs and services have been a big step forward in easing that task.

What is SIEM? A guide to cyber Security Information and Event Management

Security information and event management refer to Security Information Management (SIM) and Security Event Management (SEM) through a single pane of glass. SIEM solutions are used by security analysts to monitor any potential threats within the infrastructure of their organisation.

What are Active Directory FSMO roles and How do they Work

The FSMO (Flexible Single Master Operations) roles are vital when it comes to Active Directory. The FSMO roles help keep Active Directory consistent among all of the domain controllers in a forest by allowing only specific domain controllers to perform certain operations. Additionally, Active Directory FSMO Roles are essential for your Active Directory environment’s stability and security.

What is a Cloud Access Security Broker (CASB security)?

Cloud access control is a critical part of cloud security strategy. Without granular controls in place, unauthorized users could gain access to your data or even take down your entire cloud infrastructure. Solutions such as Cloud access broker solution (CASB) help you enforce access controls by acting as a layer separating users and cloud service providers.

CRLF Injection Attack - Explained

Web applications across the digital world are teeming with vulnerabilities increasingly equipped to defeat security mechanisms. Among them are injection attacks. We are aware of the many injection vulnerabilities present in a web application, for example, SQL injection, HTML injection, CRLF injection, cross-site scripting and many others. This article will discuss CRLF injection vulnerability in detail for web application security.

Wireless LAN Controller

Imagining a time without internet access at every point of life seems unimaginable now. The internet has been the greatest boon of the 21st century, and with wireless networking, man has progressed in leaps and bounds. It has ensured high efficiency, greater time management, increased productivity and lesser mess (no copper wires lying around). From homes to offices, students to working professionals, Wi-Fi is everyone’s go-to choice.

All You Wanted To Know About Rainbow Table Attacks

Contrary to what the name suggests, rainbow tables are nowhere as picturesque and pose a severe threat to users and businesses using the digital world. This article will attempt to break down the hows and whats of a rainbow table and arm you with knowledge on preventing a rainbow table attack. Primarily used as the base of a password cracking tool, this table helps crack password hash values or crack passwords.