top of page
CyberSecurity | And all the other things around it

CyberSecurity


The Crucial Role of Malware Development Skills for Ethical Hackers in Combatting Ransomware Threats
Cybersecurity is a front-line defense in a world increasingly targeted by cyberattacks. Among these threats, ransomware is particularly...
sandeep karnik
May 245 min read


Low-cost and secure set-up for Remotely executed Internal Pen Testing
If you are creating set-up for internal pen testing, one common and technically easiest one is simply to have physical access - i.e. the...
sandeep karnik
Dec 7, 20242 min read


Business Continuity Planning
Information Security (InfoSec) is a vast field. Among other areas, one, often neglected but equally important as others, is "Business...
sandeep karnik
Mar 1, 20235 min read


Broken Access Control - On top of the OWASP-Top 10 List
Introduction The "OWASP Top 10" lists the top ten most critical web application security risks, and "Broken Access Control" currently...
sandeep karnik
Feb 23, 20235 min read


How is Red Teaming different than Conventional Pen Testing?
Introduction The main difference is Red Teaming simulates real-life attacks. While doing so, the objective is to remain as evasive and...
sandeep karnik
Feb 22, 20236 min read


How much security is good security?
This question haunts every sys admin, network admin, product owner, and company owner! Often I am asked to evaluate the security where...
sandeep karnik
Feb 21, 20234 min read


What are you looking for - External or Internal Pen-Testing?
Introduction These are very generic, very high-level two broad categories. You want to get a gauge of the security posture of your...
sandeep karnik
Feb 20, 20235 min read


Why perform Malware Analysis?
Introduction We have seen many Cyber Attacks recently that were instrumented using malware. It is likely that malware attacks will...
sandeep karnik
Feb 19, 20236 min read


Rules of Engagement: Crucial Part of a Pen-Testing Project
The rules of engagement (RoE) in penetration testing are the guidelines and limitations set by the client or organization that define the...
sandeep karnik
Feb 4, 20232 min read


Use Vagrant to Create your VMs
Are you creating development environments directly on the host machine, and not using Virtual Machines? Using a virtual machine as a...
sandeep karnik
Feb 4, 20232 min read
bottom of page