-
This post provides details on Threat Modeling on Unmanaged Mobile Devices to Protect Corporate data from leakage.
-
This post provides details on threat hunting in the machines running in Windows operating system.
-
This post provides details on how adversaries abuse Power Automate Flows
-
This post provides details on analysing and investigating AnyDesk log files recorded in the machine running in Windows operating system.
-
This post provides details on analysing and investigating TeamViewer log files recorded in the machine running in Windows operating system.
-
This post provides details on controls to secure Web Application Programming Interfaces.
-
This post provides detail on defense controls to secure VMware vSphere infrastructure from ransomware and other sophisticated attacks
-
This post provide details on modern attack techniques observed in VMware vSphere infrastructure.
-
This post provide details on methodology to identify hardcoded credentials over various instances in AWS and git environments.
-
This post provides threat hunting mindmap for Microsoft 365 environment.