BALAJI N
BALAJI is a Former Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.
Hackers Using Sliver Framework as an Alternative to Cobalt Strike & Metasploit
Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors are opting for this option since it offers a viable alternative to commercial tools such as:-
Cobalt Strike
Metasploit
Designed with scalability...
What is XDR, MXDR, DRs & SBOM ? – Cybersecurity Acronyms 2023
The field of cybersecurity is rife with acronyms. From AES to VPN, these technical alphabet soup terms have been part of the knowledge of not only cybersecurity experts but also organizations that are planning to buy security solutions or...
Chinese Hackers Exploit FortiOS Zero-Day Vulnerability to Deploy New Malware
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only recently been discovered, and marked as a zero-day exploit, in December.
The hackers targeted both a government organization in Europe...
10 Best Free Firewall Software – 2023
In this article, we have done a depth analysis and listed your top 10 best Free Firewall software that provided extended security to protect your system from bad actors.
Generally, every computer is connected to the internet and is susceptible...
Common Browser Security Vulnerabilities Used By Hackers To Take Over Browser
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser and steal information.
To ensure browser security for enterprises and individuals, steps must be taken to keep cyber criminals away....
Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was maintained.
However, later the emergence of the attacks and the threat actors becomes more challenging and...