Rajeev RanjanPossible Phishing Attack1. Bait: The attacker typically imitates well-known companies or services to create a message or webpage that appears natural. They could…Sep 17, 20231Sep 17, 20231
Rajeev RanjanProtecting against Cobalt StrikePreventative and Threat Hunting MethodologyMay 9, 2023May 9, 2023
Rajeev RanjanAttacked From Behind ApplicationAdversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in…Mar 5, 2023Mar 5, 2023
Rajeev RanjanMFA Bypass Techniques: How Does it Work?Identification and authentication are the first phases of verification in the login processes of Information Systems. Malicious threat…Feb 11, 2023Feb 11, 2023
Rajeev RanjanPhishing, Smishing, and VishingHow do these cyber attacks work and how to prevent them?Feb 10, 20232Feb 10, 20232
Rajeev RanjanXXE (XML EXTERNAL ENTITY) InjectionWhat is XML external entity injection?Dec 27, 2022Dec 27, 2022