The 6 Hour Reporting Deadline – Meeting India’s New Cyber Security Directive.
By Jack PorterEarlier this year the Indian government issued new directives requiring organizations to report cybersecurity incidents, multiple types of [...]
Blogs
By Jack PorterEarlier this year the Indian government issued new directives requiring organizations to report cybersecurity incidents, multiple types of [...]
by Nilaa Maharjan, Security ResearchIndexClick the links and navigate to each section:What are DLLs?DLLs are a persistent attack vectorWhat is [...]
-Anish Bogati & Nilaa Maharjan; Security ResearchIndexRemnant of Log4Shell?PoC of CVE-2022-42889Detecting Text4shell using LogpointApply mitigations without delayOn Oct. 13, 2022, [...]
By Nilaa Maharjan, Security Research Index Why is this threat noteworthy? Ice-breaker #1. Delivering IcedID via contact form Ice-breaker [...]
By Ira Lisa Kristina Leino, Product Marketing ManagerUEBA enhances the investigation of unknown and insider threats and unusual patterns. The [...]
- Anish Bogati & Nilaa Maharjan; Logpoint Global Services & Security ResearchExecutive Summary:LockBit has been implicated as the most active [...]
Large databases housing valuable information are an appealing target for threat actors. After all, it’s in their interests to find [...]
Digitalization has brought huge benefits to energy sector businesses.Internet of Things (IoT) devices, advanced sensors, data analytics, and artificial intelligence [...]
The EU is often looked too as a global cybersecurity leader. And NIS2, a new EU policy in development, is [...]
by Bhabesh Raj Rai, Security ResearchOn September 29, 2022, Microsoft confirmed reports of adversaries exploiting two zero-day vulnerabilities that affect [...]