henil vedantOWASP: Web Vulnerability: SQLi & its prevention using ML for Endpoint Security.Here is our paper that was published in Springer, Singapore 2021 in which the results and technical findings can be referred:Aug 15, 2023Aug 15, 2023
henil vedantLinux as base OS (Ubuntu) — 22.04 JellybeanIt is assumed the question as to why linux, advantages of linux etc. are already known to you and that the blog covers how to boot…Aug 15, 2023Aug 15, 2023
henil vedantMicrosoft Sentinel — SIEM & SOAR setupIn this article we will go through the configuration of cloud native Microsoft sentinel as a SIEM & SOAR. SIEM — Security information &…Aug 10, 2023Aug 10, 2023
henil vedantPrivacy & Security of M.L (vs) Privacy & Security using MLPrivacy and security of ML is very different from Privacy & Security using ML and the following blog tries to shed some light on the…Aug 2, 2023Aug 2, 2023
henil vedantSunburst attack – The attack elliot warned us about..Ok not quite literally something that Elliot warned us about, but for those that have seen Mr.Robot , the title should be suffice for them…Jan 6, 2021Jan 6, 2021
henil vedantDo we live in a Simulation?For most of us humans living in a matrix/ a computer would seem as a good plot for a fiction movie… we all know about the movie matrix and…Oct 4, 2020Oct 4, 2020
henil vedantDifference and Similarities between Artificial Intelligence , Machine Learning and Data Science.We all are well acquainted with these jargons of the modern computing world and the hype around them , but let us dive a little bit deeper…Oct 4, 2020Oct 4, 2020