Bhuvanesh

Bhuvanesh

SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOCSOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any…

2 years ago
Telemedicine: Top 5 Benefits of Virtual HealthcareTelemedicine: Top 5 Benefits of Virtual Healthcare

Telemedicine: Top 5 Benefits of Virtual Healthcare

The term telehealth refers to delivering healthcare services over the internet or through mobile devices. Doctors deliver this type of…

2 years ago
SOC Third Defense Phase – Understanding Your Organization AssetsSOC Third Defense Phase – Understanding Your Organization Assets

SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which were recommended in organizations. In our second phase,…

4 years ago
SOC Second Defense Phase – Understanding the Cyber Threat ProfilesSOC Second Defense Phase – Understanding the Cyber Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary…

4 years ago
APT Hackers Using Malicious Autodesk 3ds Max Software Plugin to Hack Architecture Firm SystemsAPT Hackers Using Malicious Autodesk 3ds Max Software Plugin to Hack Architecture Firm Systems

APT Hackers Using Malicious Autodesk 3ds Max Software Plugin to Hack Architecture Firm Systems

Recently, the APT hackers exploited a vulnerability in the conventional 3D computer graphics Autodesk software in sequence to begin a…

5 years ago
CWE Top 25 – Mitre Released Top 25 Most Dangerous Software BugsCWE Top 25 – Mitre Released Top 25 Most Dangerous Software Bugs

CWE Top 25 – Mitre Released Top 25 Most Dangerous Software Bugs

Recently, Mitre released the top 25 most dangerous software bugs 2020; this list is a definitive list of the most…

5 years ago
Former Uber CISO Joseph Sullivan Charged for Helping Hackers for 2016 UBER HackFormer Uber CISO Joseph Sullivan Charged for Helping Hackers for 2016 UBER Hack

Former Uber CISO Joseph Sullivan Charged for Helping Hackers for 2016 UBER Hack

Recently, the former security chief of Uber, Joseph Sullivan, was Charged for helping hackers for the 2016 UBER hack. He…

5 years ago
Alert!! Critical Bugs in Cisco Products Let Hackers Execute Arbitrary Code to Gain Admin AccessAlert!! Critical Bugs in Cisco Products Let Hackers Execute Arbitrary Code to Gain Admin Access

Alert!! Critical Bugs in Cisco Products Let Hackers Execute Arbitrary Code to Gain Admin Access

Recently, Cisco has released several security updates to address and fix different vulnerabilities in multiple Cisco products. All these vulnerabilities…

5 years ago
New Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response HeadersNew Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response Headers

New Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response Headers

Recently, the security experts have detected a new vulnerability in Jenkins Server that was termed as CVE-2019-17638. This vulnerability could…

5 years ago
Kali Linux 2020.3 Released with New Bluetooth Arsenal, Shells and Updated Tools Icons – Download Now!!Kali Linux 2020.3 Released with New Bluetooth Arsenal, Shells and Updated Tools Icons – Download Now!!

Kali Linux 2020.3 Released with New Bluetooth Arsenal, Shells and Updated Tools Icons – Download Now!!

Offensive security Released Kali Linux 2020.3 along with a new Bluetooth Arsenal shell and updated tools icons and more. This…

5 years ago