HarisuthanJul 15, 20221 minThreat Hunting LoopThreat Hunting is basically defined as a hypothesis-based proactive detection of malicious activity, where we replicate or build an...
SATHISH RJul 10, 20222 minCloud Service ModelsThe Cloud providers categorize their services. The most common service category are, Infrastructure as a Service (IaaS). Platform as a...
Kiruthika NagarajanJul 7, 20223 minInformation Security FrameworksWhat is Information Security Framework? The development of an Information security framework offers corporate and government security...
HarisuthanJun 30, 20221 minZerologon Vulnerability | CVE-2020-1472 A security flaw in a Netlogon authentication protocol validates the authentication on domain-based networks. NETLOGON PROTOCOL The...